Patents by Inventor Edward Rose

Edward Rose has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11966333
    Abstract: Systems and methods of the present disclosure enable intelligent dynamic caching of data by accessing an activity history of historical electronic activity data entries associated with a user account, and utilizing a trained entity relevancy machine learning model to predict a degree of relevance of each entity associated with the historical electronic activity data entries in the activity history based at least in part on model parameters and activity attributes of each electronic activity data entry. A set of relevant entities are determined based at least in part on the degree of relevance of each entity. Pre-cached entities are identified based on pre-cached entity data records cached on the user device, and un-cached relevant entities from the set of relevant entities are identified based on the pre-cached entities. The cache on the user device is updated to cache the un-cached entity data records associated with the un-cached relevant entities.
    Type: Grant
    Filed: October 14, 2022
    Date of Patent: April 23, 2024
    Assignee: Capital One Services, LLC
    Inventors: Shabnam Kousha, Lin Ni Lisa Cheng, Asher Smith-Rose, Joshua Edwards, Tyler Maiman
  • Publication number: 20240126693
    Abstract: Systems and methods of the present disclosure enable intelligent dynamic caching of data by accessing an activity history of historical electronic activity data entries associated with a user account, and utilizing a trained entity relevancy machine learning model to predict a degree of relevance of each entity associated with the historical electronic activity data entries in the activity history based at least in part on model parameters and activity attributes of each electronic activity data entry. A set of relevant entities are determined based at least in part on the degree of relevance of each entity. Pre-cached entities are identified based on pre-cached entity data records cached on the user device, and un-cached relevant entities from the set of relevant entities are identified based on the pre-cached entities. The cache on the user device is updated to cache the un-cached entity data records associated with the un-cached relevant entities.
    Type: Application
    Filed: October 14, 2022
    Publication date: April 18, 2024
    Inventors: Shabnam Kousha, Lin Ni Lisa Cheng, Asher Smith-Rose, Joshua Edwards, Tyler Maiman
  • Publication number: 20240104189
    Abstract: In some embodiments, the present disclosure provides an exemplary method that may include steps of obtaining a permission from the user to monitor a plurality of activities executed within the computing device; continually monitoring the plurality of activities executed within the computing device for a predetermined period of time; identifying an indication of an incoming interaction session within the predetermined period of time; automatically verifying a session interaction parameter associated with the incoming interaction session; determining a plurality of inquires associated with the research interaction session based on the at least one session interaction parameter; identifying the plurality of demographic informational items associated with the user; and automatically updating the programmable GUI element to display the plurality of inquires associated with the interaction session and the plurality of demographic informational items associated with the user.
    Type: Application
    Filed: September 16, 2022
    Publication date: March 28, 2024
    Inventors: Joshua Edwards, Lin Ni Lisa Cheng, Asher Smith-Rose, Tyler Maiman, Shabnam Kousha
  • Publication number: 20240106843
    Abstract: In some embodiments, the present disclosure provides an exemplary method that may include steps of obtaining a trained spam upsurge detection machine learning model that determines when a current frequency associated with spam communications received by a current user exceeds a baseline frequency associated with the current user; receiving a permission indicator identifying a permission by the user to detect communications being received by the computing device; receiving an indication of at least one communication being received; determining the at least one communication as a particular spam communication; updating a frequency at which spam communications have been received by the user based at least in part on the particular spam communication; utilizing the trained spam upsurge detection machine learning model to determine that the frequency exceeds a baseline frequency associated with the user; and initiating a scan of one or more dark web resources.
    Type: Application
    Filed: September 28, 2022
    Publication date: March 28, 2024
    Inventors: Asher Smith-Rose, Joshua Edwards, Lin Ni Lisa Cheng, Shabnam Kousha, Tyler Maiman
  • Publication number: 20240098177
    Abstract: A computer-implemented method comprising: instructing a computing device to obtain a permission from the user to monitor a plurality of activities executed within the computing device; receiving a call session request from a computing device associated with a second user; utilizing a trained machine learning algorithm to confirm an identity of the user based on the call session interaction parameter to confirm the call interaction session as a verified call interaction session; generating a fictitious call session interaction parameter that differs from the at least one call session interaction parameter; modifying the call session request into a verified call session request by replacing the call session interaction parameter with the fictitious call session interaction parameter; utilizing a telecommunication network to transmit the verified call session request with the at least one fictitious session interaction parameter to the first calling-enabled computing device; automatically instructing the first c
    Type: Application
    Filed: September 15, 2022
    Publication date: March 21, 2024
    Inventors: Joshua Edwards, Asher Smith-Rose, Tyler Maiman, Lin Ni Lisa Cheng, Shabnam Kousha
  • Publication number: 20240098098
    Abstract: The present disclosure provides an exemplary method, system, and computing device that may include the steps of receiving a first indication that information of a user has been detected at one or more dark web resources; classifying the item of the compromised information into an information type category; receiving a permission indicator to detect communications by the computing device; receiving a second indication of a communication; receiving a third indication that the user engages an interaction with the communication; instructing the computing device to execute a technique to obtain data for the communication; receiving the data for the communication; determining the communication is a spam communication; determining a current information type category being discussed during the spam communication; making a determination that the current information type category corresponds to the information type category; and instructing a graphical user interface to display an alert to the user.
    Type: Application
    Filed: September 21, 2022
    Publication date: March 21, 2024
    Inventors: Asher Smith-Rose, Tyler Maiman, Joshua Edwards, Lin Ni Lisa Cheng, Shabnam Kousha
  • Publication number: 20240095228
    Abstract: In some embodiments, the present disclosure provides an exemplary method that may include steps of receiving input data from at least one external data aggregator; utilizing a trained machine learning algorithm to generate a database of known queries; receiving subsequent input data from the at least one external aggregator; automatically updating the database of known queries associated with the plurality of users; utilizing the trained machine learning algorithm to perform a cross-reference analysis to determine a presence of a data record within the database of known queries; dynamically removing the data record from the database of known queries; utilizing the trained machine learning algorithm to predict a trigger associated with the presence of the at least one data record; and instructing a computing device to initiate a verification of the presence of the at least one data record.
    Type: Application
    Filed: September 16, 2022
    Publication date: March 21, 2024
    Inventors: Shabnam Kousha, Joshua Edwards, Lin Ni Lisa Cheng, Tyler Maiman, Asher Smith-Rose
  • Publication number: 20240089370
    Abstract: Systems and methods of location-aware caller identification via machine learning techniques are disclosed. In one embodiment, an exemplary computer-implemented method may include: utilizing a trained call annotation machine learning model to determine one or both of an annotating condition and annotating location granularity, and associate one location of a user with one phone number of the user based at least on one or both of the annotating condition and the annotating location granularity; receiving second transactional information of one transaction associated with a first user; extracting second location information from the second transactional information of the one transaction; utilizing the trained call annotation machine learning model to automatically annotate one phone number record of one phone number of the first user, with the second location information at the annotating location granularity to form at least one user-specific location-specific annotated phone number record.
    Type: Application
    Filed: September 14, 2022
    Publication date: March 14, 2024
    Inventors: Asher Smith-Rose, Lin Ni Lisa Cheng, Joshua Edwards, Tyler Maiman, Shabnam Kousha
  • Publication number: 20240086262
    Abstract: In some embodiments, the present disclosure provides an exemplary method that may include steps of obtaining a permission from the user to monitor a plurality of activities executed within the computing device; receiving monitoring data of the activities executed within the plurality of computing devices for a predetermined period of time; identifying incoming interaction sessions across the plurality of computing devices; verifying one common session parameter associated with the incoming interaction sessions to identify the incoming interaction sessions as suspect interaction sessions; determining a frequency metric for the suspect interaction sessions; determining a threshold value for the frequency metric; receiving new monitoring data; determining that the new incoming interaction session has at least one common session interaction parameter with the suspect interaction sessions; automatically generating an interaction notification for transmission to the computing device; receiving a response to the int
    Type: Application
    Filed: September 14, 2022
    Publication date: March 14, 2024
    Inventors: Shabnam Kousha, Lin Ni Lisa Cheng, Asher Smith-Rose, Joshua Edwards, Tyler Maiman
  • Patent number: 11921692
    Abstract: In some embodiments, the present disclosure provides an exemplary method that may include steps of receiving input data from at least one external data aggregator; utilizing a trained machine learning algorithm to generate a database of known queries; receiving subsequent input data from the at least one external aggregator; automatically updating the database of known queries associated with the plurality of users; utilizing the trained machine learning algorithm to perform a cross-reference analysis to determine a presence of a data record within the database of known queries; dynamically removing the data record from the database of known queries; utilizing the trained machine learning algorithm to predict a trigger associated with the presence of the at least one data record; and instructing a computing device to initiate a verification of the presence of the at least one data record.
    Type: Grant
    Filed: September 16, 2022
    Date of Patent: March 5, 2024
    Assignee: Capital One Services, LLC
    Inventors: Shabnam Kousha, Joshua Edwards, Lin Ni Lisa Cheng, Tyler Maiman, Asher Smith-Rose
  • Publication number: 20240073258
    Abstract: In some embodiments, the present disclosure provides an exemplary method that may include steps of obtaining a permission to monitor a plurality of activities executed within the second computing device; continuously monitoring the plurality of activities executed within the second computing device for a predetermined period of time; receiving an indication of an incoming interaction session within the predetermined period of time; automatically verifying at least one session interaction parameter associated with the incoming interaction session to identify the incoming interaction session as a suspect interaction session; determining when a duration of time associated with the suspect interaction session meets or exceeds a predetermined duration threshold; utilizing a trained detection machine learning model to model a confidence value associated with the suspect interaction session; identifying at least one future activity subsequent to the suspect interaction session; and automatically instructing the firs
    Type: Application
    Filed: August 24, 2022
    Publication date: February 29, 2024
    Inventors: Joshua Edwards, Asher ` Smith-Rose, Tyler Maiman, Shabnam Kousha
  • Patent number: 11897787
    Abstract: A wastewater management system includes a series of water treatment modules to treat wastewater and produce reusable and/or potable water and other beneficial byproducts of the wastewater treatment process. A pretreatment module, a filtration module, an evaporator module, an odor control module, a UV-light module, an autoclave module, a sonolysis module, an ozone module and a chlorination module are combined in multiple combinations along with holding tanks, condensers, flash tanks and other components to address water purification and reclamation needs based upon specific wastewater conditions. The system captures condensate from AC systems and rainwater from rainwater gutter systems processes the water to produce reusable and/or potable water with or without re-mineralization. Any CO2 produced by the water treatment system is captured and processed using naturally-occurring flora.
    Type: Grant
    Filed: July 18, 2022
    Date of Patent: February 13, 2024
    Assignee: ZERO DISCHARGE, LLC
    Inventors: David D. Calhoun, Mark D. Lorusso, R. Edward Rose, Jr., Ernest M. Hawkesworth
  • Publication number: 20230040351
    Abstract: A wastewater management system includes a series of water treatment modules to treat wastewater and produce reusable and/or potable water and other beneficial byproducts of the wastewater treatment process. A pretreatment module, a filtration module, an evaporator module, an odor control module, a UV-light module, an autoclave module, a sonolysis module, an ozone module and a chlorination module are combined in multiple combinations along with holding tanks, condensers, flash tanks and other components to address water purification and reclamation needs based upon specific wastewater conditions. The system captures condensate from AC systems and rainwater from rainwater gutter systems processes the water to produce reusable and/or potable water with or without re-mineralization. Any CO2 produced by the water treatment system is captured and processed using naturally-occurring flora.
    Type: Application
    Filed: July 18, 2022
    Publication date: February 9, 2023
    Applicant: Zero Discharge, LLC
    Inventors: David D. Calhoun, Mark D. Lorusso, R. Edward Rose, JR., Ernest M. Hawkesworth
  • Publication number: 20220360601
    Abstract: A method and system for policy driven vulnerability management of a network equipment of an enterprise. A plurality of routes delivers services to a plurality of end user devices through the system. A plurality of vulnerabilities associated with the end user device, and a plurality of policies associated with the plurality of vulnerabilities is identified. Remediation for the plurality of vulnerabilities is determined based on the plurality of policies. The plurality of policies is based on a cloud service selected from the end user device, a tenant, and a role associated with the end user device. A route corresponding to the plurality of policies and the cloud service is identified. The remediation of the vulnerabilities is performed by upgrading the plurality of vulnerabilities based on the plurality of policies and the cloud service is provided to the end user device via the route based on the plurality of policies.
    Type: Application
    Filed: May 7, 2021
    Publication date: November 10, 2022
    Applicant: Netskope, Inc.
    Inventor: Brandon Edward Rose
  • Publication number: 20220360602
    Abstract: A system for policy based vulnerability management of a network equipment of an enterprise is disclosed. A plurality of vulnerabilities associated with an end user device and a plurality of policies associated with the plurality of vulnerabilities is identified. Security risks associated with the plurality of vulnerabilities based on a type of the plurality of vulnerabilities are identified. Remediation for the plurality of vulnerabilities is determined based on the plurality of policies and prioritized based on the vulnerabilities, the security risks, and the policies. The plurality of policies is based on a cloud service selected from the end user device, a tenant, and a role associated with the end user device. A route corresponding to the plurality of policies and the cloud service is identified. The route specifies the end user device or a mid-link server. The cloud service is provided to the end user device via the route.
    Type: Application
    Filed: December 17, 2021
    Publication date: November 10, 2022
    Inventor: Brandon Edward Rose
  • Publication number: 20220263213
    Abstract: An antenna is provided. The antenna comprises a dielectric lamina having a first face and a second face opposite the first face. The antenna further comprises a groundplane on the first face of the dielectric lamina, wherein the groundplane is a planar conductive groundplane comprising first and second L-shaped apertures. The antenna further comprises a microstrip transmission line on the second face of the dielectric lamina.
    Type: Application
    Filed: July 6, 2020
    Publication date: August 18, 2022
    Applicant: Zuma Array Limited
    Inventors: Morten WARREN, Edward ROSE, Brian COLLINS
  • Patent number: 11390545
    Abstract: A wastewater management system includes a series of holding tanks in combination with a membrane bioreactor treatment subsystem connected to one or more autoclaves and/or sonolysis units and thermal evaporators to treat liquid discharge from the system. A condenser connected to the thermal evaporator(s) condenses water vapor created by the thermal evaporator(s) into its liquid state for delivery to, and assimilation by, plants in a dedicated greenhouse or hydroponic system or for reuse in a building. CO2 and water vapor produced by combustion of a thermal evaporator fuel source is sent through the condenser to add to the liquid water recovery. The CO2 is flowed into the greenhouse(s) for carbon fixation by plants. A CO2 monitoring system ensures the concentration of CO2 in the greenhouse is maintained at an acceptable level for humans. Ozonation, UV and/or chloride treatments may be used as optional water purification treatments in the system.
    Type: Grant
    Filed: April 29, 2020
    Date of Patent: July 19, 2022
    Assignee: ZERO DISCHARGE, LLC
    Inventors: David D. Calhoun, Mark D. Lorusso, R. Edward Rose, Jr.
  • Patent number: 11378570
    Abstract: A cytotoxicity method for medical devices that has equivalent sensitivity, and greater efficiency compared to the colony formation assay (CFA) direct contact method is developed. The quantitative, direct contact cytotoxicity test method uses Mouse lymphoma TK or human lymphoblastoid TK6 suspension cells for medical device safety assessment. The advantages of using the suspension cell assay over adherent V79-4 cells is that this approach is quantitative, automated, not susceptible to potential mechanical damage imparted by the overlying test materials, and avoids issues related to non-adherence of cells to the test material which might impact the interpretation of test results.
    Type: Grant
    Filed: May 24, 2018
    Date of Patent: July 5, 2022
    Assignee: Alcon Inc.
    Inventors: Xuemei Liu, Fan Zhang, Denise P. Rodeheaver, Ann Marie Wright, Charlon Tolliver, Jamie Michaelis Walker, Robert Edward Rose, Stephen Paul Shannon, Jeffrey Charles White
  • Patent number: 11233815
    Abstract: A method and system for policy driven vulnerability management of a network equipment of an enterprise. A plurality of routes delivers services to a plurality of end user devices. A plurality of vulnerabilities associated with an end user device and a plurality of policies associated with the plurality of vulnerabilities is identified by a mid-link server. Remediation for the plurality of vulnerabilities is determined based on the plurality of policies. The plurality of policies is based on a cloud service selected from the end user device, a tenant, and a role associated with the end user device. A route corresponding to the plurality of policies and the cloud service is identified. The remediation of the vulnerabilities is executed at the end user device or the mid-link server based on the plurality of policies. The cloud service is provided to the end user device via the route.
    Type: Grant
    Filed: June 4, 2021
    Date of Patent: January 25, 2022
    Assignee: Netskope, Inc.
    Inventor: Brandon Edward Rose
  • Publication number: 20200339454
    Abstract: A wastewater management system includes a series of holding tanks in combination with a membrane bioreactor treatment subsystem connected to one or more autoclaves and/or sonolysis units and thermal evaporators to treat liquid discharge from the system. A condenser connected to the thermal evaporator(s) condenses water vapor created by the thermal evaporator(s) into its liquid state for delivery to, and assimilation by, plants in a dedicated greenhouse or hydroponic system or for reuse in a building. CO2 and water vapor produced by combustion of a thermal evaporator fuel source is sent through the condenser to add to the liquid water recovery. The CO2 is flowed into the greenhouse(s) for carbon fixation by plants. A CO2 monitoring system ensures the concentration of CO2 in the greenhouse is maintained at an acceptable level for humans. Ozonation, UV and/or chloride treatments may be used as optional water purification treatments in the system.
    Type: Application
    Filed: April 29, 2020
    Publication date: October 29, 2020
    Applicant: Zero Discharge, LLC
    Inventors: David D. Calhoun, Mark D. Lorusso, R. Edward Rose, JR.