Patents by Inventor George White

George White has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11954203
    Abstract: Methods and devices for determining whether a mobile device has been compromised. The mobile device has a managed portion of memory and an unmanaged portion of memory, a managed profile and an unmanaged profile, and the managed profile includes files stored in the managed portion of memory and the unmanaged profile includes files stored in the unmanaged portion of memory. The managed profile is governed by a device policy set by a remote administrator. File tree structure information for the unmanaged profile of the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in the unmanaged portion of memory. It is determined from the file tree structure information that the mobile device has been compromised and, based on that determination, an action is taken.
    Type: Grant
    Filed: February 1, 2023
    Date of Patent: April 9, 2024
    Assignee: BlackBerry Limited
    Inventors: Chang Fung Yang, Robert Joseph Lombardi, Chi Hing Ng, Johnathan George White
  • Patent number: 11928011
    Abstract: Embodiments of systems and methods for enhanced drift remediation with causal methods and online model modification are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: detect drift in an Artificial Intelligence (AI) or Machine Learning (ML) model configured to make a prediction or a causal reasoning graphical or structural inference based upon input data, identify a root cause of the drift, and tag the input data with an indication of the root cause.
    Type: Grant
    Filed: October 22, 2021
    Date of Patent: March 12, 2024
    Assignee: Dell Products, L.P.
    Inventors: Said Tabet, Jeffery White, George Currie, Xin Ma
  • Patent number: 11918273
    Abstract: Embodiments of the invention provide a hollow cable for transmitting radiofrequency and/or microwave frequency energy to an electrosurgical instrument, wherein the hollow cable is provided with electrical connectors for forming a bipolar electrical connection with an electrosurgical instrument that fits within, e.g. slides relative to, the hollow cable. The connectors can be conductive protrusions extending in an axial direction on opposite sides of the cable. The protrusions can be tabs, fins, rods, pins, or wires. The protrusions can be strips which engage corresponding terminals on the instrument. The transmission line structure of the invention can have a greater diameter then convention coaxial cables, which can minimise loss whilst still providing access for control wires and/or fluid to reach an surgical instrument. The cable can be used with multiple instruments.
    Type: Grant
    Filed: January 18, 2022
    Date of Patent: March 5, 2024
    Assignee: CREO MEDICAL LIMITED
    Inventors: Christopher Paul Hancock, Malcolm White, George Christian Ullrich, David Edward Webb, Louis Turner
  • Publication number: 20240068558
    Abstract: Magnetically-assisted mechanical gear systems and other power transmission systems, and related methods of operation and assembly, are disclosed herein. In an example embodiment, such a system includes a driving gear, a driven gear, and a first magnetomotive force (MMF) source that generates a magnetic flux. A first portion of the flux is communicated between at least one driving gear teeth and at least one driven gear teeth so that one or more magnetic forces are exerted between the gears. When the first rotational movement of the driving gear alternates from being in the first rotational direction to being in a third rotational direction opposite the first rotational direction, then the driven gear is driven by the one or more magnetic forces so that the second rotational movement also alternates, and a first amount of backlash movement between the driving and driven gears is avoided or reduced.
    Type: Application
    Filed: August 31, 2022
    Publication date: February 29, 2024
    Inventors: Adam Michael White, Joseph Michael Stock, Joshua Max Jones, Waleed Said, Nicholas Shaun Palmer, David George Kloos
  • Patent number: 11715057
    Abstract: A retail environment is modeled and simulated based on aggregated operational data. Real-time aggregated data for operations of the retail environment is detected and predictive adjustments to the retail environment are provided for making one or more changes to the retail environment based on the modeled and simulated environment.
    Type: Grant
    Filed: February 29, 2016
    Date of Patent: August 1, 2023
    Assignee: NCR Corporation
    Inventor: Alfred George White, II
  • Publication number: 20230224307
    Abstract: Methods and devices for determining whether a mobile device has been compromised. File tree structure information for the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in a portion of memory. The file tree structure information is analyzed to determine that the mobile device has been compromised, has not been compromised, or might be compromised. Based on determining that the mobile device might be compromised, the mobile device is instructed to execute a restricted action. If the restricted action occurs on the mobile device then it is determined that the mobile device has been compromised. Based on that determination, an action is taken.
    Type: Application
    Filed: March 14, 2023
    Publication date: July 13, 2023
    Applicant: BlackBerry Limited
    Inventors: Chang Fung YANG, Robert Joseph LOMBARDI, Chi Hing NG, Johnathan George WHITE
  • Publication number: 20230185914
    Abstract: Methods and devices for determining whether a mobile device has been compromised. The mobile device has a managed portion of memory and an unmanaged portion of memory, a managed profile and an unmanaged profile, and the managed profile includes files stored in the managed portion of memory and the unmanaged profile includes files stored in the unmanaged portion of memory. The managed profile is governed by a device policy set by a remote administrator. File tree structure information for the unmanaged profile of the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in the unmanaged portion of memory. It is determined from the file tree structure information that the mobile device has been compromised and, based on that determination, an action is taken.
    Type: Application
    Filed: February 1, 2023
    Publication date: June 15, 2023
    Applicant: BlackBerry Limited
    Inventors: Chang Fung YANG, Robert Joseph LOMBARDI, Chi Hing NG, Johnathan George WHITE
  • Patent number: 11645402
    Abstract: Methods and devices for determining whether a computing device has been compromised. File tree structure information for the computing device is obtained that details at least a portion of a tree-based structure of folders and files in a memory on the computing device. It is then determined from the file tree structure information that the computing device is compromised and, based on the determination that the computing device has been compromised, an action is taken.
    Type: Grant
    Filed: August 15, 2019
    Date of Patent: May 9, 2023
    Assignee: BlackBerry Limited
    Inventors: Chang Fung Yang, Chi Hing Ng, Robert Joseph Lombardi, Johnathan George White
  • Patent number: 11632377
    Abstract: Methods and devices for determining whether a mobile device has been compromised. File tree structure information for the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in a portion of memory. The file tree structure information is analyzed to determine that the mobile device has been compromised, has not been compromised, or might be compromised. Based on determining that the mobile device might be compromised, the mobile device is instructed to execute a restricted action. If the restricted action occurs on the mobile device then it is determined that the mobile device has been compromised. Based on that determination, an action is taken.
    Type: Grant
    Filed: August 15, 2019
    Date of Patent: April 18, 2023
    Assignee: BlackBerry Limited
    Inventors: Chang Fung Yang, Robert Joseph Lombardi, Chi Hing Ng, Johnathan George White
  • Patent number: 11599676
    Abstract: Described herein is a system and method of application container access, the method includes performing a foreground unlock on an application container; creating a copy of a container key of the application container; locking the application container; receiving a background unlock trigger; determining whether a background unlock is authorized; performing the background unlock on at least a portion of the application container using the copy of the container key in response to determining the background unlock is authorized; and storing data in the at least a portion of the application container while the application container is in the background unlock.
    Type: Grant
    Filed: March 7, 2019
    Date of Patent: March 7, 2023
    Assignee: BlackBerry Limited
    Inventors: Johnathan George White, Rajeev Ragunathan Nair, David John Reynolds
  • Patent number: 11599639
    Abstract: Methods and devices for determining whether a mobile device has been compromised. The mobile device has a managed portion of memory and an unmanaged portion of memory, a managed profile and an unmanaged profile, and the managed profile includes files stored in the managed portion of memory and the unmanaged profile includes files stored in the unmanaged portion of memory. The managed profile is governed by a device policy set by a remote administrator. File tree structure information for the unmanaged profile of the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in the unmanaged portion of memory. It is determined from the file tree structure information that the mobile device has been compromised and, based on that determination, an action is taken.
    Type: Grant
    Filed: August 15, 2019
    Date of Patent: March 7, 2023
    Assignee: BlackBerry Limited
    Inventors: Chang Fung Yang, Robert Joseph Lombardi, Chi Hing Ng, Johnathan George White
  • Patent number: 11343258
    Abstract: Methods and devices for determining whether a mobile device has been compromised. The mobile device has a managed portion of memory and an unmanaged portion of memory, a managed profile and an unmanaged profile, and the managed profile includes files stored in the managed portion of memory and the unmanaged profile includes files stored in the unmanaged portion of memory. The managed profile is governed by a device policy set by a remote administrator. File tree structure information for the managed profile of the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in the managed portion of memory. It is determined from the file tree structure information that the mobile device has been compromised and, based on that determination, an action is taken.
    Type: Grant
    Filed: August 15, 2019
    Date of Patent: May 24, 2022
    Assignee: BlackBerry Limited
    Inventors: Chang Fung Yang, Robert Joseph Lombardi, Chi Hing Ng, Johnathan George White
  • Patent number: 11272697
    Abstract: The fishing rod holder with strike indicator is a free-standing fishing strike indicating device. The fishing rod holder with strike indicator is a stand which holds the fishing rod. The fishing rod holder with strike indicator allows for the adjustment of the cant between the fishing rod and the ground. The adjustment of the cant allows for the adjustment of the angle of attack between the fishing line and the water. The fishing rod holder with strike indicator comprises a tripod, a pedestal, and a control circuit. The pedestal mounts on the tripod. The control circuit is contained within the tripod. The tripod is a supporting structure that adjusts the elevation of the pedestal relative to the ground. The fishing rod mounts on the pedestal. The control circuit detects when a fish has struck the fishing line and generates a visible alarm and an audible alarm.
    Type: Grant
    Filed: March 5, 2019
    Date of Patent: March 15, 2022
    Inventors: Frank White, George White
  • Patent number: 11240026
    Abstract: Devices and methods of managing data stored within a container. The container may be associated with at least one registered user. The data within the container may be encrypted by a data encryption key (DEK). A computing device includes: a security module including a crypto-processor, a main processor, and memory. The memory stores instructions that, when executed, configure a processor to: authenticate a user based on a user secret associated with the container and generate a soft key based on the user secret. The instructions cause a crypto-processor to generate a secure generator output including a crypto key component and generate a hardened user key based on a key agreement protocol using the soft key and the crypto key component. The instructions cause a processor to construct an unencrypted DEK associated with the hardened user key and decrypt the subset of data using the unencrypted DEK.
    Type: Grant
    Filed: May 16, 2019
    Date of Patent: February 1, 2022
    Assignee: BlackBerry Limited
    Inventors: Johnathan George White, Daniel Richard L. Brown
  • Patent number: 11233784
    Abstract: A method for managing access to a shared endpoint of a network is disclosed. The method includes: receiving a user request to access a service associated with the shared endpoint; verifying that a user associated with the user request is authorized to access the service; in response to verifying that the user is authorized to access the service, obtaining a unique session identifier (USID) associated with the user request; receiving, via input from a device associated with the user, an access code; in response to determining that the inputted access code matches the USID, granting access to the service for the user.
    Type: Grant
    Filed: May 6, 2019
    Date of Patent: January 25, 2022
    Assignee: BlackBerry Limited
    Inventors: Rajeev Ragunathan Nair, Seung Sub Jung, Johnathan George White
  • Publication number: 20220005262
    Abstract: An augmented reality boating and fishing system includes a client device comprising a client application, a computing system comprising a server-based application and a database datastore comprising topobathy data that are presented as data elevation model (DEM) data of a water body. The client application accesses the server-based application and the database datastore via a network connection. The server-based application includes an augmented reality (AR) engine, a computing algorithm, and a rendering engine. The AR engine receives the DEM data of the water body and environmental factor inputs and uses the computing algorithm to calculate fish probability distributions of various types of fish within the water body. The rendering engine fuses the calculated fish probability distributions and DEM data and generates an AR composite image that is viewed via the client device.
    Type: Application
    Filed: June 21, 2021
    Publication date: January 6, 2022
    Applicant: Clearview, Inc.
    Inventors: JOSHUA HONAKER, CHRIS MCROBBIE, DAVID ROSE, GEORGE WHITE, JOSHUA JACOBS, MADELEINE FOUGERE, MICHAEL LEONARDO
  • Patent number: 11182494
    Abstract: A method of controlling access to data on a first electronic device, the method comprising steps of establishing a shared encryption key with a first software application instance running on a second electronic device, receiving a ‘begin session’ command sent by the first software application instance and responsive to the ‘begin session’ command, creating a storage location in a data store of the electronic device, obtaining a data encryption key, receiving data, encrypting the data using the data encryption key and storing the encrypted data in the storage location, receiving an ‘end session’ command sent by the first software application instance and responsive to the ‘end session’ command, discarding the shared encryption key, and deleting the encrypted data from the storage location.
    Type: Grant
    Filed: September 25, 2019
    Date of Patent: November 23, 2021
    Assignee: BlackBerry Limited
    Inventors: Siavash James Joorabchian Hawkins, Phillip Riscombe-Burton, Johnathan George White
  • Publication number: 20210051158
    Abstract: Methods and devices for determining whether a mobile device has been compromised. File tree structure information for the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in a portion of memory. The file tree structure information is analyzed to determine that the mobile device has been compromised, has not been compromised, or might be compromised. Based on determining that the mobile device might be compromised, the mobile device is instructed to execute a restricted action. If the restricted action occurs on the mobile device then it is determined that the mobile device has been compromised. Based on that determination, an action is taken.
    Type: Application
    Filed: August 15, 2019
    Publication date: February 18, 2021
    Applicant: BlackBerry Limited
    Inventors: Chang Fung YANG, Robert Joseph LOMBARDI, Chi Hing NG, Johnathan George WHITE
  • Publication number: 20210051156
    Abstract: Methods and devices for determining whether a mobile device has been compromised. The mobile device has a managed portion of memory and an unmanaged portion of memory, a managed profile and an unmanaged profile, and the managed profile includes files stored in the managed portion of memory and the unmanaged profile includes files stored in the unmanaged portion of memory. The managed profile is governed by a device policy set by a remote administrator. File tree structure information for the managed profile of the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in the managed portion of memory.
    Type: Application
    Filed: August 15, 2019
    Publication date: February 18, 2021
    Applicant: BlackBerry Limited
    Inventors: Chang Fung YANG, Robert Joseph LOMBARDI, Chi Hing NG, Johnathan George WHITE
  • Publication number: 20210049273
    Abstract: Methods and devices for determining whether a mobile device has been compromised. The mobile device has a managed portion of memory and an unmanaged portion of memory, a managed profile and an unmanaged profile, and the managed profile includes files stored in the managed portion of memory and the unmanaged profile includes files stored in the unmanaged portion of memory. The managed profile is governed by a device policy set by a remote administrator. File tree structure information for the unmanaged profile of the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in the unmanaged portion of memory. It is determined from the file tree structure information that the mobile device has been compromised and, based on that determination, an action is taken.
    Type: Application
    Filed: August 15, 2019
    Publication date: February 18, 2021
    Applicant: BlackBerry Limited
    Inventors: Chang Fung YANG, Robert Joseph LOMBARDI, Chi Hing NG, Johnathan George WHITE