Patents by Inventor Edward Rose
Edward Rose has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11966333Abstract: Systems and methods of the present disclosure enable intelligent dynamic caching of data by accessing an activity history of historical electronic activity data entries associated with a user account, and utilizing a trained entity relevancy machine learning model to predict a degree of relevance of each entity associated with the historical electronic activity data entries in the activity history based at least in part on model parameters and activity attributes of each electronic activity data entry. A set of relevant entities are determined based at least in part on the degree of relevance of each entity. Pre-cached entities are identified based on pre-cached entity data records cached on the user device, and un-cached relevant entities from the set of relevant entities are identified based on the pre-cached entities. The cache on the user device is updated to cache the un-cached entity data records associated with the un-cached relevant entities.Type: GrantFiled: October 14, 2022Date of Patent: April 23, 2024Assignee: Capital One Services, LLCInventors: Shabnam Kousha, Lin Ni Lisa Cheng, Asher Smith-Rose, Joshua Edwards, Tyler Maiman
-
Publication number: 20240126693Abstract: Systems and methods of the present disclosure enable intelligent dynamic caching of data by accessing an activity history of historical electronic activity data entries associated with a user account, and utilizing a trained entity relevancy machine learning model to predict a degree of relevance of each entity associated with the historical electronic activity data entries in the activity history based at least in part on model parameters and activity attributes of each electronic activity data entry. A set of relevant entities are determined based at least in part on the degree of relevance of each entity. Pre-cached entities are identified based on pre-cached entity data records cached on the user device, and un-cached relevant entities from the set of relevant entities are identified based on the pre-cached entities. The cache on the user device is updated to cache the un-cached entity data records associated with the un-cached relevant entities.Type: ApplicationFiled: October 14, 2022Publication date: April 18, 2024Inventors: Shabnam Kousha, Lin Ni Lisa Cheng, Asher Smith-Rose, Joshua Edwards, Tyler Maiman
-
Publication number: 20240104189Abstract: In some embodiments, the present disclosure provides an exemplary method that may include steps of obtaining a permission from the user to monitor a plurality of activities executed within the computing device; continually monitoring the plurality of activities executed within the computing device for a predetermined period of time; identifying an indication of an incoming interaction session within the predetermined period of time; automatically verifying a session interaction parameter associated with the incoming interaction session; determining a plurality of inquires associated with the research interaction session based on the at least one session interaction parameter; identifying the plurality of demographic informational items associated with the user; and automatically updating the programmable GUI element to display the plurality of inquires associated with the interaction session and the plurality of demographic informational items associated with the user.Type: ApplicationFiled: September 16, 2022Publication date: March 28, 2024Inventors: Joshua Edwards, Lin Ni Lisa Cheng, Asher Smith-Rose, Tyler Maiman, Shabnam Kousha
-
Publication number: 20240106843Abstract: In some embodiments, the present disclosure provides an exemplary method that may include steps of obtaining a trained spam upsurge detection machine learning model that determines when a current frequency associated with spam communications received by a current user exceeds a baseline frequency associated with the current user; receiving a permission indicator identifying a permission by the user to detect communications being received by the computing device; receiving an indication of at least one communication being received; determining the at least one communication as a particular spam communication; updating a frequency at which spam communications have been received by the user based at least in part on the particular spam communication; utilizing the trained spam upsurge detection machine learning model to determine that the frequency exceeds a baseline frequency associated with the user; and initiating a scan of one or more dark web resources.Type: ApplicationFiled: September 28, 2022Publication date: March 28, 2024Inventors: Asher Smith-Rose, Joshua Edwards, Lin Ni Lisa Cheng, Shabnam Kousha, Tyler Maiman
-
Publication number: 20240098177Abstract: A computer-implemented method comprising: instructing a computing device to obtain a permission from the user to monitor a plurality of activities executed within the computing device; receiving a call session request from a computing device associated with a second user; utilizing a trained machine learning algorithm to confirm an identity of the user based on the call session interaction parameter to confirm the call interaction session as a verified call interaction session; generating a fictitious call session interaction parameter that differs from the at least one call session interaction parameter; modifying the call session request into a verified call session request by replacing the call session interaction parameter with the fictitious call session interaction parameter; utilizing a telecommunication network to transmit the verified call session request with the at least one fictitious session interaction parameter to the first calling-enabled computing device; automatically instructing the first cType: ApplicationFiled: September 15, 2022Publication date: March 21, 2024Inventors: Joshua Edwards, Asher Smith-Rose, Tyler Maiman, Lin Ni Lisa Cheng, Shabnam Kousha
-
Publication number: 20240098098Abstract: The present disclosure provides an exemplary method, system, and computing device that may include the steps of receiving a first indication that information of a user has been detected at one or more dark web resources; classifying the item of the compromised information into an information type category; receiving a permission indicator to detect communications by the computing device; receiving a second indication of a communication; receiving a third indication that the user engages an interaction with the communication; instructing the computing device to execute a technique to obtain data for the communication; receiving the data for the communication; determining the communication is a spam communication; determining a current information type category being discussed during the spam communication; making a determination that the current information type category corresponds to the information type category; and instructing a graphical user interface to display an alert to the user.Type: ApplicationFiled: September 21, 2022Publication date: March 21, 2024Inventors: Asher Smith-Rose, Tyler Maiman, Joshua Edwards, Lin Ni Lisa Cheng, Shabnam Kousha
-
Publication number: 20240095228Abstract: In some embodiments, the present disclosure provides an exemplary method that may include steps of receiving input data from at least one external data aggregator; utilizing a trained machine learning algorithm to generate a database of known queries; receiving subsequent input data from the at least one external aggregator; automatically updating the database of known queries associated with the plurality of users; utilizing the trained machine learning algorithm to perform a cross-reference analysis to determine a presence of a data record within the database of known queries; dynamically removing the data record from the database of known queries; utilizing the trained machine learning algorithm to predict a trigger associated with the presence of the at least one data record; and instructing a computing device to initiate a verification of the presence of the at least one data record.Type: ApplicationFiled: September 16, 2022Publication date: March 21, 2024Inventors: Shabnam Kousha, Joshua Edwards, Lin Ni Lisa Cheng, Tyler Maiman, Asher Smith-Rose
-
Publication number: 20240089370Abstract: Systems and methods of location-aware caller identification via machine learning techniques are disclosed. In one embodiment, an exemplary computer-implemented method may include: utilizing a trained call annotation machine learning model to determine one or both of an annotating condition and annotating location granularity, and associate one location of a user with one phone number of the user based at least on one or both of the annotating condition and the annotating location granularity; receiving second transactional information of one transaction associated with a first user; extracting second location information from the second transactional information of the one transaction; utilizing the trained call annotation machine learning model to automatically annotate one phone number record of one phone number of the first user, with the second location information at the annotating location granularity to form at least one user-specific location-specific annotated phone number record.Type: ApplicationFiled: September 14, 2022Publication date: March 14, 2024Inventors: Asher Smith-Rose, Lin Ni Lisa Cheng, Joshua Edwards, Tyler Maiman, Shabnam Kousha
-
Publication number: 20240086262Abstract: In some embodiments, the present disclosure provides an exemplary method that may include steps of obtaining a permission from the user to monitor a plurality of activities executed within the computing device; receiving monitoring data of the activities executed within the plurality of computing devices for a predetermined period of time; identifying incoming interaction sessions across the plurality of computing devices; verifying one common session parameter associated with the incoming interaction sessions to identify the incoming interaction sessions as suspect interaction sessions; determining a frequency metric for the suspect interaction sessions; determining a threshold value for the frequency metric; receiving new monitoring data; determining that the new incoming interaction session has at least one common session interaction parameter with the suspect interaction sessions; automatically generating an interaction notification for transmission to the computing device; receiving a response to the intType: ApplicationFiled: September 14, 2022Publication date: March 14, 2024Inventors: Shabnam Kousha, Lin Ni Lisa Cheng, Asher Smith-Rose, Joshua Edwards, Tyler Maiman
-
Patent number: 11921692Abstract: In some embodiments, the present disclosure provides an exemplary method that may include steps of receiving input data from at least one external data aggregator; utilizing a trained machine learning algorithm to generate a database of known queries; receiving subsequent input data from the at least one external aggregator; automatically updating the database of known queries associated with the plurality of users; utilizing the trained machine learning algorithm to perform a cross-reference analysis to determine a presence of a data record within the database of known queries; dynamically removing the data record from the database of known queries; utilizing the trained machine learning algorithm to predict a trigger associated with the presence of the at least one data record; and instructing a computing device to initiate a verification of the presence of the at least one data record.Type: GrantFiled: September 16, 2022Date of Patent: March 5, 2024Assignee: Capital One Services, LLCInventors: Shabnam Kousha, Joshua Edwards, Lin Ni Lisa Cheng, Tyler Maiman, Asher Smith-Rose
-
Publication number: 20240073258Abstract: In some embodiments, the present disclosure provides an exemplary method that may include steps of obtaining a permission to monitor a plurality of activities executed within the second computing device; continuously monitoring the plurality of activities executed within the second computing device for a predetermined period of time; receiving an indication of an incoming interaction session within the predetermined period of time; automatically verifying at least one session interaction parameter associated with the incoming interaction session to identify the incoming interaction session as a suspect interaction session; determining when a duration of time associated with the suspect interaction session meets or exceeds a predetermined duration threshold; utilizing a trained detection machine learning model to model a confidence value associated with the suspect interaction session; identifying at least one future activity subsequent to the suspect interaction session; and automatically instructing the firsType: ApplicationFiled: August 24, 2022Publication date: February 29, 2024Inventors: Joshua Edwards, Asher ` Smith-Rose, Tyler Maiman, Shabnam Kousha
-
Patent number: 11897787Abstract: A wastewater management system includes a series of water treatment modules to treat wastewater and produce reusable and/or potable water and other beneficial byproducts of the wastewater treatment process. A pretreatment module, a filtration module, an evaporator module, an odor control module, a UV-light module, an autoclave module, a sonolysis module, an ozone module and a chlorination module are combined in multiple combinations along with holding tanks, condensers, flash tanks and other components to address water purification and reclamation needs based upon specific wastewater conditions. The system captures condensate from AC systems and rainwater from rainwater gutter systems processes the water to produce reusable and/or potable water with or without re-mineralization. Any CO2 produced by the water treatment system is captured and processed using naturally-occurring flora.Type: GrantFiled: July 18, 2022Date of Patent: February 13, 2024Assignee: ZERO DISCHARGE, LLCInventors: David D. Calhoun, Mark D. Lorusso, R. Edward Rose, Jr., Ernest M. Hawkesworth
-
Publication number: 20230040351Abstract: A wastewater management system includes a series of water treatment modules to treat wastewater and produce reusable and/or potable water and other beneficial byproducts of the wastewater treatment process. A pretreatment module, a filtration module, an evaporator module, an odor control module, a UV-light module, an autoclave module, a sonolysis module, an ozone module and a chlorination module are combined in multiple combinations along with holding tanks, condensers, flash tanks and other components to address water purification and reclamation needs based upon specific wastewater conditions. The system captures condensate from AC systems and rainwater from rainwater gutter systems processes the water to produce reusable and/or potable water with or without re-mineralization. Any CO2 produced by the water treatment system is captured and processed using naturally-occurring flora.Type: ApplicationFiled: July 18, 2022Publication date: February 9, 2023Applicant: Zero Discharge, LLCInventors: David D. Calhoun, Mark D. Lorusso, R. Edward Rose, JR., Ernest M. Hawkesworth
-
Publication number: 20220360601Abstract: A method and system for policy driven vulnerability management of a network equipment of an enterprise. A plurality of routes delivers services to a plurality of end user devices through the system. A plurality of vulnerabilities associated with the end user device, and a plurality of policies associated with the plurality of vulnerabilities is identified. Remediation for the plurality of vulnerabilities is determined based on the plurality of policies. The plurality of policies is based on a cloud service selected from the end user device, a tenant, and a role associated with the end user device. A route corresponding to the plurality of policies and the cloud service is identified. The remediation of the vulnerabilities is performed by upgrading the plurality of vulnerabilities based on the plurality of policies and the cloud service is provided to the end user device via the route based on the plurality of policies.Type: ApplicationFiled: May 7, 2021Publication date: November 10, 2022Applicant: Netskope, Inc.Inventor: Brandon Edward Rose
-
Publication number: 20220360602Abstract: A system for policy based vulnerability management of a network equipment of an enterprise is disclosed. A plurality of vulnerabilities associated with an end user device and a plurality of policies associated with the plurality of vulnerabilities is identified. Security risks associated with the plurality of vulnerabilities based on a type of the plurality of vulnerabilities are identified. Remediation for the plurality of vulnerabilities is determined based on the plurality of policies and prioritized based on the vulnerabilities, the security risks, and the policies. The plurality of policies is based on a cloud service selected from the end user device, a tenant, and a role associated with the end user device. A route corresponding to the plurality of policies and the cloud service is identified. The route specifies the end user device or a mid-link server. The cloud service is provided to the end user device via the route.Type: ApplicationFiled: December 17, 2021Publication date: November 10, 2022Inventor: Brandon Edward Rose
-
Publication number: 20220263213Abstract: An antenna is provided. The antenna comprises a dielectric lamina having a first face and a second face opposite the first face. The antenna further comprises a groundplane on the first face of the dielectric lamina, wherein the groundplane is a planar conductive groundplane comprising first and second L-shaped apertures. The antenna further comprises a microstrip transmission line on the second face of the dielectric lamina.Type: ApplicationFiled: July 6, 2020Publication date: August 18, 2022Applicant: Zuma Array LimitedInventors: Morten WARREN, Edward ROSE, Brian COLLINS
-
Patent number: 11390545Abstract: A wastewater management system includes a series of holding tanks in combination with a membrane bioreactor treatment subsystem connected to one or more autoclaves and/or sonolysis units and thermal evaporators to treat liquid discharge from the system. A condenser connected to the thermal evaporator(s) condenses water vapor created by the thermal evaporator(s) into its liquid state for delivery to, and assimilation by, plants in a dedicated greenhouse or hydroponic system or for reuse in a building. CO2 and water vapor produced by combustion of a thermal evaporator fuel source is sent through the condenser to add to the liquid water recovery. The CO2 is flowed into the greenhouse(s) for carbon fixation by plants. A CO2 monitoring system ensures the concentration of CO2 in the greenhouse is maintained at an acceptable level for humans. Ozonation, UV and/or chloride treatments may be used as optional water purification treatments in the system.Type: GrantFiled: April 29, 2020Date of Patent: July 19, 2022Assignee: ZERO DISCHARGE, LLCInventors: David D. Calhoun, Mark D. Lorusso, R. Edward Rose, Jr.
-
Patent number: 11378570Abstract: A cytotoxicity method for medical devices that has equivalent sensitivity, and greater efficiency compared to the colony formation assay (CFA) direct contact method is developed. The quantitative, direct contact cytotoxicity test method uses Mouse lymphoma TK or human lymphoblastoid TK6 suspension cells for medical device safety assessment. The advantages of using the suspension cell assay over adherent V79-4 cells is that this approach is quantitative, automated, not susceptible to potential mechanical damage imparted by the overlying test materials, and avoids issues related to non-adherence of cells to the test material which might impact the interpretation of test results.Type: GrantFiled: May 24, 2018Date of Patent: July 5, 2022Assignee: Alcon Inc.Inventors: Xuemei Liu, Fan Zhang, Denise P. Rodeheaver, Ann Marie Wright, Charlon Tolliver, Jamie Michaelis Walker, Robert Edward Rose, Stephen Paul Shannon, Jeffrey Charles White
-
Patent number: 11233815Abstract: A method and system for policy driven vulnerability management of a network equipment of an enterprise. A plurality of routes delivers services to a plurality of end user devices. A plurality of vulnerabilities associated with an end user device and a plurality of policies associated with the plurality of vulnerabilities is identified by a mid-link server. Remediation for the plurality of vulnerabilities is determined based on the plurality of policies. The plurality of policies is based on a cloud service selected from the end user device, a tenant, and a role associated with the end user device. A route corresponding to the plurality of policies and the cloud service is identified. The remediation of the vulnerabilities is executed at the end user device or the mid-link server based on the plurality of policies. The cloud service is provided to the end user device via the route.Type: GrantFiled: June 4, 2021Date of Patent: January 25, 2022Assignee: Netskope, Inc.Inventor: Brandon Edward Rose
-
Publication number: 20200339454Abstract: A wastewater management system includes a series of holding tanks in combination with a membrane bioreactor treatment subsystem connected to one or more autoclaves and/or sonolysis units and thermal evaporators to treat liquid discharge from the system. A condenser connected to the thermal evaporator(s) condenses water vapor created by the thermal evaporator(s) into its liquid state for delivery to, and assimilation by, plants in a dedicated greenhouse or hydroponic system or for reuse in a building. CO2 and water vapor produced by combustion of a thermal evaporator fuel source is sent through the condenser to add to the liquid water recovery. The CO2 is flowed into the greenhouse(s) for carbon fixation by plants. A CO2 monitoring system ensures the concentration of CO2 in the greenhouse is maintained at an acceptable level for humans. Ozonation, UV and/or chloride treatments may be used as optional water purification treatments in the system.Type: ApplicationFiled: April 29, 2020Publication date: October 29, 2020Applicant: Zero Discharge, LLCInventors: David D. Calhoun, Mark D. Lorusso, R. Edward Rose, JR.