Patents by Inventor G. Andrews
G. Andrews has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250121350Abstract: The present disclosure provides methods and systems for processing of ultramafic materials. The ultramafic materials may comprise olivine. The methods and systems described herein may include a high-pressure grinding roll (HPGR) to process the ultramafic materials. The processed ultramafic materials may be added to an aqueous solution to increase an alkalinity of the solution. The processed ultramafic materials may capture carbon dioxide (e.g., atmospheric carbon dioxide.Type: ApplicationFiled: May 8, 2024Publication date: April 17, 2025Inventors: Geoffrey W. CALKINS, Devon Barnes COLE, Douglas O. EDWARDS, Stephan Wilhelm Maria KIRSCH, Stephen J. ROMANIELLO, Brian D. LEY, Margaret G. ANDREWS, Nathan G. WALWORTH, Thomas ISHOEY, Francesc MONTSERRAT, Chloe S. LEACH, David L. KRIEBEL, Tom C. GREEN
-
Publication number: 20250039153Abstract: In some examples, a scatter network device includes a non-transitory memory, at least one processor, and a scattering application stored in the non-transitory memory. When executed by the at least one processor, the scattering application monitors a socket for the presence of data, responsive to detecting data at the socket, determines a type of the data, responsive to determining the type of the data, services the data, responsive to not detecting data at the socket, monitors for network tunnel (TUN) data, and responsive to detecting TUN data, services the TUN data.Type: ApplicationFiled: July 28, 2023Publication date: January 30, 2025Inventors: John G. ANDREWS, John P. KEYERLEBER, Tomas H. MCMONIGAL
-
Publication number: 20250007707Abstract: Examples of the disclosure provide for a scatter network device. In some examples, the scatter network device includes a non-transitory memory, at least one processor, and a key exchange application stored in the non-transitory memory. When executed by the at least one processor, the key exchange application generates a key exchange request, transmits the key exchange request to a first network endpoint via a first communication band, responsive to transmitting the key exchange request, receives a key exchange response, generates a symmetric encryption key based on the key exchange response, and transmits an authenticated message encrypted via the symmetric encryption key to a second network endpoint via a second communication band.Type: ApplicationFiled: June 30, 2023Publication date: January 2, 2025Inventors: John G. ANDREWS, John P. KEYERLEBER
-
Publication number: 20250007686Abstract: Examples of the disclosure provide for a scatter network device. In some examples, the scatter network device includes a non-transitory memory, at least one processor, and a key exchange application stored in the non-transitory memory. When executed by the at least one processor, the key exchange application generates a key exchange request encrypted according to a public encryption key of a first network endpoint, wherein the encrypted key exchange request is indistinguishable from uniform random noise, and transmits the key exchange request to the first network endpoint via a first communication band, wherein the scatter network device transmits authenticated messages via a second communication band.Type: ApplicationFiled: June 30, 2023Publication date: January 2, 2025Inventors: John G. ANDREWS, John P. KEYERLEBER
-
Publication number: 20250007852Abstract: A method of secure data routing with dynamic packet spoofing is disclosed that comprises a scatter network node receiving data packets from a user communication device and a scattering application selecting a logical communication channel from a plurality of logical communication channels. The method also comprises a channel controller receiving channel information that comprises a size limit corresponding to data packets being transmitted over the logical communication channel and modifying a received data packet based on the channel information such that a size of the modified data packet satisfies the size limit. The method additionally comprises a channel adapter wrapping the modified data packet to correspond to a particular protocol that is different than an initial protocol of the modified data packet. The method further comprises transmitting the modified data packet wrapped to correspond to the particular protocol via the logical communication channel to a counterpart scatter network device.Type: ApplicationFiled: June 30, 2023Publication date: January 2, 2025Inventors: John G. ANDREWS, John P. KEYERLEBER
-
Publication number: 20250007718Abstract: Examples of the disclosure provide for a scatter network device. In some examples, the scatter network device includes a non-transitory memory, at least one processor, and a key exchange application stored in the non-transitory memory. When executed by the at least one processor, the key exchange application transmits a key exchange request to a first network endpoint, the key exchange request including an identifier of the scatter network device, receives a key exchange response from the first network endpoint, the key exchange response including a set of one-time-use endpoint validation tokens (EVTs) uniquely associated with the identifier of the scatter network device, and transmits an authenticated message to a second network endpoint, the authenticated message including a first of the set of one-time-use EVTs concatenated with an encrypted data portion.Type: ApplicationFiled: June 30, 2023Publication date: January 2, 2025Inventors: John G. ANDREWS, John P. KEYERLEBER
-
Publication number: 20250007833Abstract: A scatter network device. The device comprises a non-transitory memory, an at least one physical interface, an at least one processor, and a scattering application stored in the non-transitory memory. When executed by the processor the scattering application establishes a plurality of logical communication channels, wherein each logical communication channel associates one of the at least one physical interface, a source Internet protocol (IP) address, and a destination IP address, receives a plurality of data packets from a user system, scatters the plurality of data packets across the plurality of logical communication channels by sending at least some of the plurality of data packets via different logical communication channels to a counterpart scatter network device, and, for each logical communication channel, when the logical communication channel has been idle for a predefined period of time, sends a heartbeat packet via the logical communication channel to the counterpart scatter network device.Type: ApplicationFiled: September 11, 2024Publication date: January 2, 2025Inventors: John G. ANDREWS, Mikel Youssef AWAD, Matthew William CARPENTER, John P. KEYERLEBER
-
Patent number: 12120028Abstract: A secure data routing method and system are disclosed. Logical communication channels are established that each associate an IP address and a protocol port associated with a first computer system to an IP address and a protocol port associated with a second or third computer system. Some logical communication channels associated with the second computer system and some logical communication channels associated with the third computer system are associated with the same IP address and protocol port associated with the first computer system. Data packets are received and parsed to find tokens embedded in the headers. A first data packet embedding a first token is associated to a first source and is decrypted using a first decryption key associated with the first source. A second data packet embedding a second token is associated to a second source and is decrypted using a second decryption key associated with the second source.Type: GrantFiled: March 31, 2023Date of Patent: October 15, 2024Assignee: SCATR, CorpInventors: John G. Andrews, Mikel Youssef Awad, Matthew William Carpenter, John P. Keyerleber
-
Publication number: 20240333642Abstract: A secure data routing method and system are disclosed. Logical communication channels are established that each associate an IP address and a protocol port associated with a first computer system to an IP address and a protocol port associated with a second or third computer system. Some logical communication channels associated with the second computer system and some logical communication channels associated with the third computer system are associated with the same IP address and protocol port associated with the first computer system. Data packets are received and parsed to find tokens embedded in the headers. A first data packet embedding a first token is associated to a first source and is decrypted using a first decryption key associated with the first source. A second data packet embedding a second token is associated to a second source and is decrypted using a second decryption key associated with the second source.Type: ApplicationFiled: March 31, 2023Publication date: October 3, 2024Inventors: John G. ANDREWS, Mikel Youssef AWAD, Matthew William CARPENTER, John P. KEYERLEBER
-
Publication number: 20240109031Abstract: The present disclosure provides a system for processing ultramafic material. The system may comprise a reactor for accelerating weathering of said ultramafic material. The reactor may comprise one or more chambers comprising one or more microbes, biological medicators, or enzymatic accelerants to facilitate the weathering of the ultramafic material.Type: ApplicationFiled: April 19, 2023Publication date: April 4, 2024Inventors: Stephen J. ROMANIELLO, Brian D. LEY, Douglas O. EDWARDS, Margaret G. ANDREWS, Nathan G. WALWORTH, Thomas ISHOEY, Tom C. GREEN, Francesc MONTSERRAT, Martin VAN DEN BERGHE, Kenneth NEALSON, Devon Barnes COLE, Kelly ERHART
-
Publication number: 20220416937Abstract: Various embodiments of the present technology provide a novel deep learning-based error correction coding scheme for AWGN channels under the constraint of moderate to low bit quantization (e.g., one-bit quantization) in the receiver. Some embodiments of the error correction code minimize the probability of bit error can be obtained by perfectly training a special autoencoder, in which “perfectly” refers to finding the global minima of its cost function. However, perfect training is not possible in most cases. To approach the performance of a perfectly trained autoencoder with a suboptimum training, some embodiments utilize turbo codes as an implicit regularization, i.e., using a concatenation of a turbo code and an autoencoder.Type: ApplicationFiled: August 26, 2020Publication date: December 29, 2022Inventors: Jeffrey G. Andrews, Eren Balevi
-
Patent number: 10549191Abstract: Various application-centric user interface techniques are described. A user can easily launch, add, or update applications. An application-centric activity center can be presented as part of a user interface for an operating system shell. A file defining metadata for an application can be defined. The techniques can be applied to game-related software.Type: GrantFiled: March 31, 2017Date of Patent: February 4, 2020Assignee: Microsoft Technology Licensing, LLCInventors: C. Shane Evans, Roderick M. Toll, G. Andrew Johnston, II
-
Patent number: 10208996Abstract: A tray assembly for a device for freezing a liquid, the assembly includes a frame defining an aperture. A thermally conductive tray is sized to be received within the aperture, the thermally conductive tray having a body and a lip circumferentially disposed about the body, the thermally conductive tray being seated within the aperture and defining a first surface and an opposite second surface, the first surface defining a recess and the second surface defining a plurality of receptacles. A gasket is included and sized to surround the body and to be disposed between the lip and the frame. An insulation chamber is coupled to the frame.Type: GrantFiled: May 2, 2017Date of Patent: February 19, 2019Assignee: Beyond Zero, Inc.Inventors: Jason S. Sherman, D. Paul Haviland, Grayson P. Newland, L. Dennis Hall, Jr., G. Andrew Wiehebrink
-
Patent number: 10171194Abstract: A system and method are provided wherein one or more femtocell base stations are deployed within a range of a cellular base station and utilize substantially the same frequency band as the cellular base station. Each femtocell base station may be configured to employ one or more interference avoidance techniques such that coexistence between the cellular and the corresponding femtocell base station is enabled. The interference avoidance techniques employed may include use of randomized time or frequency hopping; randomly selecting a predetermined number, or identifying one or more unutilized, frequency subchannels for signal transmission; using two or more transmit, and two or more receive antennas; nulling one or more transmissions in a direction of a nearby cellular base station user; handing off at least one cellular user to one of the femtocell base stations and vice versa; and/or reducing the transmission power of at least one femtocell base station.Type: GrantFiled: June 19, 2015Date of Patent: January 1, 2019Assignee: Board of Regents, The University of Texas SystemInventors: Jeffrey G. Andrews, Vikram Chandrasekhar
-
Patent number: 10055524Abstract: An apparatus is provided for finite element modeling and analysis of a structural product. A pre-processing system may produce a finite element model of a structural product including component parts joined by a fastener. The finite element model may represent the product by respective meshes of elements including shell or solid elements for the component parts, and beam and spring elements for the fastener in which at least one spring element has an axial offset from the shell or solid elements with respect to an axis of the fastener. A processing system may perform a finite element method (FEM) failure analysis of the finite element model under an external load that is transferable from the component parts to the fastener. The FEM failure analysis may produce an output that indicates a behavior of the fastener, and the FEM failure analysis may predict a component failure rate of the fastener based on the behavior.Type: GrantFiled: April 26, 2016Date of Patent: August 21, 2018Assignee: The Boeing CompanyInventors: Hangki Lee, Martin G. Andrews, Madhavadas Ramnath, Andrew R. Anderson, Taeksun Nam, Gerald E. Mabson
-
Publication number: 20170321942Abstract: A tray assembly for a device for freezing a liquid, the assembly includes a frame defining an aperture. A thermally conductive tray is sized to be received within the aperture, the thermally conductive tray having a body and a lip circumferentially disposed about the body, the thermally conductive tray being seated within the aperture and defining a first surface and an opposite second surface, the first surface defining a recess and the second surface defining a plurality of receptacles. A gasket is included and sized to surround the body and to be disposed between the lip and the frame. An insulation chamber is coupled to the frame.Type: ApplicationFiled: May 2, 2017Publication date: November 9, 2017Inventors: Jason S. SHERMAN, D. Paul HAVILAND, Grayson P. NEWLAND, L. Dennis HALL, JR., G. Andrew WIEHEBRINK
-
Publication number: 20170308633Abstract: An apparatus is provided for finite element modeling and analysis of a structural product. A pre-processing system may produce a finite element model of a structural product including component parts joined by a fastener. The finite element model may represent the product by respective meshes of elements including shell or solid elements for the component parts, and beam and spring elements for the fastener in which at least one spring element has an axial offset from the shell or solid elements with respect to an axis of the fastener. A processing system may perform a finite element method (FEM) failure analysis of the finite element model under an external load that is transferable from the component parts to the fastener. The FEM failure analysis may produce an output that indicates a behavior of the fastener, and the FEM failure analysis may predict a component failure rate of the fastener based on the behavior.Type: ApplicationFiled: April 26, 2016Publication date: October 26, 2017Inventors: Hangki Lee, Martin G. Andrews, Madhavadas Ramnath, Andrew R. Anderson, Taeksun Nam, Gerald E. Mabson
-
Publication number: 20170206094Abstract: Various application-centric user interface techniques are described. A user can easily launch, add, or update applications. An application-centric activity center can be presented as part of a user interface for an operating system shell. A file defining metadata for an application can be defined. The techniques can be applied to game-related software.Type: ApplicationFiled: March 31, 2017Publication date: July 20, 2017Applicant: Microsoft Technology Licensing, LLCInventors: C. Shane Evans, Roderick M. Toll, G. Andrew Johnston, II
-
Patent number: 9610498Abstract: Various application-centric user interface techniques are described. A user can easily launch, add, or update applications. An application-centric activity center can be presented as part of a user interface for an operating system shell. A file defining metadata for an application can be defined. The techniques can be applied to game-related software.Type: GrantFiled: June 16, 2012Date of Patent: April 4, 2017Assignee: Microsoft Technology Licensing, LLCInventors: C. Shane Evans, Roderick M. Toll, G. Andrew Johnston, II
-
Patent number: D1062232Type: GrantFiled: March 8, 2022Date of Patent: February 18, 2025Assignee: SKÖ, LLCInventors: Larry G. Andrew, Nathan L. Andrew