Patents by Inventor Glenn Scott

Glenn Scott has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10567369
    Abstract: Embodiments presented herein provide systems and methods for creating and modifying a hash chain. A hash chain is created to track resource-privilege transfers between entities. A root node of the hash chain identifies the resource and specifies a digest of a possession token held by a first entity that initially possesses the privilege. A transfer of the privilege to a second entity can be recorded by adding an expansion node to the hash chain. If the second entity successfully reveals a possession token that a hashing function associated with the hash chain maps to the digest, an expansion node is linked to the root node. The expansion node indicates the possession token and a successor digest that is based on a successor possession token.
    Type: Grant
    Filed: July 10, 2017
    Date of Patent: February 18, 2020
    Assignee: INTUIT INC.
    Inventors: Glenn Scott, Induprakas Keri
  • Patent number: 10543897
    Abstract: There is provided a training system capable of performing work. The system has a shape memory alloy (SMA) actuator exhibiting a generally planar transformational behavior. The system further has one or more heating elements for transforming the SMA actuator from an original shape to a trained shape, thereby performing work.
    Type: Grant
    Filed: April 3, 2017
    Date of Patent: January 28, 2020
    Assignee: The Boeing Company
    Inventors: Jonathan K. Brown, Glenn Scott Bushnell, Dan J. Clingman
  • Publication number: 20190370366
    Abstract: The invention relates to a method for documenting subjects using hash chains. The method includes receiving a subject data write request including one or more subject attribute values, generating a fingerprint from a current last block of a hash chain, and generating a payload from the subject data, the payload including the one or more subject attribute values and one or more keys identifying the one or more subject attribute values. The method further includes appending a block to the hash chain. The appended block includes the payload and the fingerprint.
    Type: Application
    Filed: May 31, 2018
    Publication date: December 5, 2019
    Applicant: Intuit Inc.
    Inventors: Glenn Scott, Roger Meike, Michael Gabriel, Ian Panchevre, Amir Eftekhari, Ian Pentland
  • Publication number: 20190356662
    Abstract: The present disclosure relates to a trustworthy data exchange. Embodiments include receiving, from a device, a query, wherein the query comprises a question. Embodiments include identifying particular information related to the query. Embodiments include receiving credentials from a user for retrieving the particular information related to the query. Embodiments include retrieving, using the credentials, the particular information related to the query from one or more data repositories that are part of a distributed database comprising an immutable data store that maintains a verifiable history of changes to information stored in the distributed database. Embodiments include determining, based on the particular information related to the query, an answer to the query. Embodiments include providing the answer to the device.
    Type: Application
    Filed: July 30, 2019
    Publication date: November 21, 2019
    Inventors: Glenn SCOTT, Michael R. GABRIEL, Parikshit LINGAMPALLY, Roger MEIKE, Ian Maya PANCHEVRE
  • Patent number: 10456091
    Abstract: Embodiments described herein relate to an analyte monitoring device having a user interface with a display and a plurality of actuators. The display is configured to render a plurality of display screens, including a home screen and an alert screen. The home screen is divided into a plurality of simultaneously displayed panels, with a first panel displays a rate of change of continuously monitored analyte levels in interstitial fluid, a second panel simultaneously displays a current analyte level and an analyte trend indicator, and a third panel displays status information of a plurality of components of the device. When an alarm condition is detected, the display renders the alert screen in place of the home screen, the alert screen displaying information corresponding to the detected alarm condition. Furthermore, the actuators are configured to affect further output of the analyte monitoring device corresponding to the detected condition.
    Type: Grant
    Filed: November 5, 2018
    Date of Patent: October 29, 2019
    Assignee: Abbott Diabetes Care Inc.
    Inventors: Wesley Scott Harper, Annie C. Tan, Timothy Christian Dunn, Mark Kent Sloan, Kenneth J. Doniger, Michael Love, Phillip Yee, Gary Alan Hayter, R. Curtis Jennewine, Glenn Howard Berman
  • Patent number: 10412087
    Abstract: The present disclosure relates to a trustworthy data exchange between a first device and a second device. In some embodiments, a query is received from the second device. The query may comprise a question and an indication of a trusted authority that is to certify authenticity of information used to determine an answer to the query. In some embodiments, information related to the query is determined. In certain embodiments, credentials are received from a user for retrieving the information. In some embodiments, information related to the query is retrieved, using the credentials, from one or more data repositories storing data verified by the trusted authority. In certain embodiments, an answer to the query is determined based on the information. In come embodiments, the answer is provided to the second device. The answer may indicate that the answer is based upon information certified by the trusted authority.
    Type: Grant
    Filed: May 31, 2017
    Date of Patent: September 10, 2019
    Assignee: INTUIT, INC.
    Inventors: Glenn Scott, Michael R. Gabriel, Parikshit Lingampally, Roger Meike, Ian Maya Panchevre
  • Publication number: 20190273605
    Abstract: Certain aspects of the present disclosure provide techniques for summarizing data in a distributed system. Embodiments include generating an ordered list of blocks by iterating through a first group of blocks of a hash chain starting at a last block of the hash chain and adding each of the first group of blocks of the hash chain to the ordered list. Embodiments further include generating summary data by applying a summary function to the first group of blocks based on the ordered list. The summary function may take the ordered list as an input and provide the summary data of the first group of blocks as an output. Embodiments further include generating a summary block comprising the summary data and adding the summary block to a summary chain.
    Type: Application
    Filed: March 1, 2018
    Publication date: September 5, 2019
    Inventors: Michael R. GABRIEL, Glenn SCOTT
  • Publication number: 20190266602
    Abstract: The invention relates to a method for overseeing execution of graph-based contracts using hash chains. The method includes obtaining a graph-based contract. The graph-based contract is configured to enforce a contract for performing a transaction between at least two parties. The method also includes obtaining event data associated with an execution of the graph-based contract, and performing, governed by the graph-based contract, a first state transition from a first state to a second state by making a determination that a first state transition criterion is met by the event data, with the first state transition connecting the second state to the first state, and based on the determination transitioning to the second state. The method further includes appending a first block to a hash chain. The first block includes a documentation of the first state transition.
    Type: Application
    Filed: February 28, 2018
    Publication date: August 29, 2019
    Applicant: Intuit Inc.
    Inventors: Amir Eftekhari, Glenn Scott, Roger Meike, Mike Gabriel, Ian Panchevre, Ian Pentland
  • Publication number: 20190263430
    Abstract: A system and method includes determining, with a sensor assembly disposed onboard a first aerial vehicle, a direction in which a fluid flows within or through the first aerial vehicle, and determining an orientation of the first aerial vehicle relative to a second aerial vehicle based at least in part on the direction in which the fluid flows within or through the first aerial vehicle.
    Type: Application
    Filed: May 14, 2019
    Publication date: August 29, 2019
    Inventors: Eugene Smith, Ajith Kuttannair Kumar, Wolfgang Daum, Martin Paget, Daniel Rush, Sameh Fahmy, Brad Thomas Costa, Seneca Snyder, Jerry Duncan, Mark Bradshaw Kraeling, Michael Scott Miner, Shannon Joseph Clouse, Anwarul Azam, Matthew Lawrence Blair, Nidhi Naithani, Dattaraj Jagdish Rao, Anju Bind, Sreyashi Dey Chaki, Scott Daniel Nelson, Nikhil Uday Naphade, Wing Yeung Chung, Daniel Malachi Ballesty, Glenn Robert Shaffer, Jeffret James Kisak, Dale Martin DiDomenico, Suresh Govindappa, Manibabu Pippalla, Sethu Madhavan, Jared Klineman Cooper, Huan Tan, John Michael Lizzi, Charles Burton Theurer, Balajee Kannan, Romano Patrick, Brad Thomas Costa, James D. Brooks, Micahel Scott Miner, Harry Kirk Matthews, JR., Bradford Wayne Miller, Neeraja Subrahmaniyan, Brian Joseph McManus, Frank Wawrzyniak, Ralph C. Haddock, III, Robert James Foy, James Glen Corry, Steven Andrew Kellner, Joseph Mario Nazareth, Brian William Schroeck, Shawn Arthur McClintic
  • Publication number: 20190260584
    Abstract: Methods, systems, and media for improving computer security and performance of security are disclosed. In one example, a computer security system comprises a key management monitor, and two key elements comprising a first key element and a second key element. The first key element is stored at a first location address within a computer memory and the second key element is stored at a second location address. The key management monitor is configured to determine or receive a time duration for performing a data dump of contents of the computer memory. In one example, the key management monitor is further configured to control a location of the first key element within the computer memory, wherein the location address of the first key element is changed within a time period that is less than the time duration for performing the data dump of contents of the computer memory.
    Type: Application
    Filed: February 21, 2018
    Publication date: August 22, 2019
    Inventors: Michael J.T. Chan, Derek Chamorro, Venkata Siva Vijayendra Bhamidipati, Glenn G. Lebumfacil, Ralph Scott Forsythe
  • Publication number: 20190228132
    Abstract: Certain aspects of the present disclosure provide techniques for managing data in a plurality of nodes of a distributed system. Embodiments include storing, by a node of the plurality of nodes, sensitive data in a block of a hash chain. Embodiments further include determining, by the node, that the sensitive data should not be distributed to other nodes of the plurality of nodes. Embodiments further include distributing, by the node, a limited version of the block to the other nodes. The limited version of the block may comprise a hash and a pointer to a previous block of the hash chain, and the limited version of the block may not contain the sensitive data.
    Type: Application
    Filed: January 22, 2018
    Publication date: July 25, 2019
    Inventors: Michael R. Gabriel, Glenn Scott
  • Publication number: 20190199512
    Abstract: Techniques are disclosed for managing encrypted data stored in one or more blocks of a first data structure. One embodiment presented herein includes a computer-implemented method, which includes retrieving the encrypted data from the one or more blocks. The method further includes placing the encrypted data in a container object. The method further includes applying an encryption technique to the container object to generate an encrypted container object and a key. The method further includes generating a second data structure. A first block of the second data structure may include either the encrypted container object or information related to the encrypted container object.
    Type: Application
    Filed: December 22, 2017
    Publication date: June 27, 2019
    Inventors: Ian R. Pentland, Glenn Scott, Roger Meike, Michael R. Gabriel
  • Patent number: 10330545
    Abstract: A transducer sensor body includes a first support structure and a second support structure. A tubular element has a center bore along a longitudinal axis. An elongated first flexure joins the tubular element to the first support structure parallel to the longitudinal axis. The first flexure is rigid to transfer a longitudinal force therethrough along the longitudinal axis and is rigid to transfer an axial force therethrough along an axial axis that is orthogonal to the longitudinal axis. An elongated second flexure joins the tubular element to the second support structure parallel to the longitudinal axis. The second flexure is rigid to transfer a longitudinal force therethrough along the longitudinal axis and is to transfer the axial force therethrough along the axial axis.
    Type: Grant
    Filed: December 23, 2016
    Date of Patent: June 25, 2019
    Assignee: MTS SYSTEMS CORPORATION
    Inventors: Richard Alan Meyer, Glenn Arthur Lucachick, Matthew David Slama, Robbin Scott Roberts
  • Publication number: 20190176862
    Abstract: System includes a controller configured to obtain one or more of a route parameter or a vehicle parameter from discrete examinations of one or more of a route or a vehicle system. The route parameter is indicative of a health of the route over which the vehicle system travels. The vehicle parameter is indicative of a health of the vehicle system. The discrete examinations of the one or more of the route or the vehicle system separated from each other by one or more of location or time. The controller is configured to examine the one or more of the route parameter or the vehicle parameter to determine whether the one or more of the route or the vehicle system is damaged. The system also includes examination equipment configured to continually monitor the one or more of the route or the vehicle system responsive to determining that the one or more of the route or the vehicle is damaged.
    Type: Application
    Filed: February 14, 2019
    Publication date: June 13, 2019
    Inventors: Ajith Kuttannair Kumar, Wolfgang Daum, Martin Paget, Daniel Rush, Brad Thomas Costa, Seneca Snyder, Jerry Duncan, Mark Bradshaw Kraeling, Michael Scott Miner, Shannon Joseph Clouse, Anwarul Azam, Matthew Lawrence Blair, Nidhi Naithani, Dattaraj Jagdish Rao, Anju Bind, Sreyashi Dey Chaki, Scott Daniel Nelson, Nikhil Uday Naphade, Wing Yeung Chung, Daniel Malachi Ballesty, Glenn Robert Shaffer, Jeffrey James Kisak, Dale Martin DiDomenico, Suresh Govindappa, Manibabu Pippalla, Sethu Madhavan, Arunachala Karthik Sridharan, Prabhu Marimuthu, Jared Klineman Cooper, Joseph Forrest Noffsinger, Paul Kenneth Houpt, David Lowell McKay
  • Patent number: 10315540
    Abstract: A motor vehicle seating assembly comprises a seat support bracket, a lower seat cushion mounted to the seat support bracket, and a latch pivotally mounted to the lower seat cushion. An inertia link is pivotally and operatively coupled with the lower seat cushion and operatively coupled with the latch, the inertia link having a first rotational position corresponding to an unlocked condition of the latch, allowing movement of the lower seat cushion between a raised stowed position and a lowered deployed position, and a second rotational position corresponding to a locked condition of the latch, preventing movement of the lower seat cushion from the raised stowed position to the lowered deployed position. The inertia link moves from the first rotational position to the second rotational position upon a predetermined deceleration of the motor vehicle.
    Type: Grant
    Filed: December 6, 2016
    Date of Patent: June 11, 2019
    Assignee: FORD GLOBAL TECHNOLOGIES, LLC
    Inventors: Mark Caye, Glenn Scott
  • Publication number: 20190130042
    Abstract: Embodiments presented herein provide systems and methods for disambiguating the identity of a record to which information imported from a third-party data source pertains. For example, in one embodiment, a record-storage service creates a record of a transaction between a first entity and a second entity. Upon receiving an indication that an instrument will be used to transfer a value for the transaction, the record-storage service associates a code to be printed on the instrument with the record and sends the code to an application that will be used to generate the instrument. Subsequently, the record-storage service receives information imported from electronic records provided by a third-party institution. The information also includes a code provided on the instrument and a status. Upon determining that the code provided on the instrument matches the code associated with the record, the record-storage service updates the record to reflect the status.
    Type: Application
    Filed: October 27, 2017
    Publication date: May 2, 2019
    Inventors: Michael R. GABRIEL, Rachel JACK, Roger MEIKE, Ian Maya PANCHEVRE, Glenn SCOTT
  • Publication number: 20190123890
    Abstract: Techniques are disclosed for managing data of an application. One embodiment presented herein includes a computer-implemented method, which includes scanning a distributed system to identify one or more blocks comprising data associated with the application. The method further includes generating a witness block based on the one or more blocks. The witness block may comprise a state of the data from the one or more blocks. The method further includes adding the witness block to the distributed system.
    Type: Application
    Filed: October 24, 2017
    Publication date: April 25, 2019
    Inventors: Glenn SCOTT, Michael R. GABRIEL
  • Publication number: 20190121894
    Abstract: Techniques are disclosed for managing a series of blocks in a distributed system. One embodiment presented herein includes a computer-implemented method, which includes dividing the series of blocks into a plurality of groups. The method further includes distributing the plurality of groups to a plurality of processors. The plurality of processors may apply one or more functions to each group of the plurality of groups in parallel. The method further includes receiving, from the plurality of processors, results of the one or more functions. The method further includes merging the results to generate combined results. The combined results may be used in processing data.
    Type: Application
    Filed: October 20, 2017
    Publication date: April 25, 2019
    Inventors: Glenn Scott, Michael R. Gabriel
  • Patent number: 10211622
    Abstract: An electrical system includes an operation MEMS switch operable in on and off states to enable and disable current flow to a load and a fault interruption MEMS switch positioned in series with the operation MEMS switch. The fault interruption MEMS switch is operable in on and off states to enable and disable current flow to the electrical load, with operation of the fault interruption MEMS switch in the off state disabling current flow to the load regardless of the state of the operation MEMS switch. A fault sensor control system operate to sense a system variable, analyze the system variable to detect if a fault is affecting the electrical system and, upon detection of a fault, switch the fault interruption MEMS switch from the on state to the off state to interrupt current flowing through the operation MEMS switch to the load.
    Type: Grant
    Filed: June 29, 2016
    Date of Patent: February 19, 2019
    Assignee: General Electric Company
    Inventors: Stanton Earl Weaver, Richard St-Pierre, Glenn Scott Claydon
  • Publication number: 20190042989
    Abstract: Techniques are disclosed for managing workflows using block chains. An entire workflow may be stored as a finite state machine on a block chain. Each data block of the block chain may correspond to a state and related operation of a workflow. Each data block of the block chain may be used as an input to a subsequent state of the workflow. Thus, any input may be used to compute the workflow even if the input is not designed to be used by a workflow. Nested block chains, each corresponding to a different workflow or different part of a workflow may be used to increase performance of computing the workflows.
    Type: Application
    Filed: August 2, 2017
    Publication date: February 7, 2019
    Inventor: Glenn SCOTT