Patents by Inventor Gregory A. Rose

Gregory A. Rose has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240132292
    Abstract: A guide rail device mountable to a container sealing line for guiding moving containers. The guide rail device includes a base mountable to the container sealing line, and a guide rail assembly having a first guide surface adapted to guide containers along a portion of the can sealing line. The guide rail assembly includes a first member, and a second member, wherein the first and second members are adjustably attached to one another. The guide rail assembly is securable to the base after the base is mounted to the container sealing line such that the guide rail assembly and base are self-aligning with respect to one another.
    Type: Application
    Filed: October 19, 2023
    Publication date: April 25, 2024
    Applicant: BEVCORP, LLC
    Inventors: Kristen Rose Mason, Chane Lee, Gregory Brinovec
  • Publication number: 20210290190
    Abstract: An anatomical measurement device and method enables a medical professional to obtain anatomical measurements of a patient. The anatomical measurements may be obtained directly from the patient or from a radiographic image, such as an x-ray, using the measurement device. The measurement device includes a base that includes a linear portion joining branches at each end of the base. The branches may extend perpendicularly to the linear portion. A handle extends at an angle from a first side of the base's linear portion and a protractor arm extends from the opposite side of the base's linear portion. The position and angle of the protractor arm may be adjusted along at least a portion of the length of the base's linear portion. Each of the branches, the linear portion, and the protractor arm may include respective scales to enable the medical professional to take measurements.
    Type: Application
    Filed: March 17, 2020
    Publication date: September 23, 2021
    Inventors: Steven Rose, Gregory Rose
  • Publication number: 20190332961
    Abstract: Described are media, systems, and methods to detect an unpermitted renovation event and validate the detected event from a data set ingested from a plurality of unique external data sources by identifying candidate renovations, determining the probability and timing of an unpermitted renovation associated with the candidate renovation, and validating the probability and timing of the unpermitted renovation. Further described are applications and methods to prioritize inspection of unpermitted renovation candidates and validate the prioritization.
    Type: Application
    Filed: April 26, 2019
    Publication date: October 31, 2019
    Inventors: Gregory ROSE, Neil SENTURIA, Neil DUTTA
  • Publication number: 20190333175
    Abstract: Described are applications and methods to detect a real estate transfer event and validate the detected event from a data set ingested from a plurality of unique external data sources by identifying an initial candidate, determining the probability that the improper real estate transfer event has taken place, and validating the probability of the improper real estate event.
    Type: Application
    Filed: April 26, 2019
    Publication date: October 31, 2019
    Inventors: Gregory ROSE, Nickolas DEL PEGO, Brian FINK, James CHRISTOPHER
  • Publication number: 20190333173
    Abstract: Described are medias, systems, and computer-implemented methods to detect improper residency status by performing a data mining task to data source to detect one or more improper residency indicia, applying a machine learning algorithm to identify an initial candidate, calculating a probability that the initial candidate has an improper residency status, and validating the detection. Further described are medias, systems, and computer-implemented methods to detect improper occupancy tax status.
    Type: Application
    Filed: April 26, 2019
    Publication date: October 31, 2019
    Inventors: Gregory ROSE, Jessica FLANAGAN, Anthony MORIARTY
  • Publication number: 20160210160
    Abstract: A portable self-contained node computer is provided. The portable self-contained node computer connects to a host computer. The host computer allows the portable node computer to access its peripheral input/output devices.
    Type: Application
    Filed: February 25, 2016
    Publication date: July 21, 2016
    Inventors: Alexander GANTMAN, Gregory ROSE, Jack STEENSTRA, Liren CHEN, Adam J. DREW
  • Patent number: 9274815
    Abstract: A portable self-contained node apparatus establishes a connection to a host apparatus having one or more peripheral devices connected directly thereto. The node apparatus is configured to view the one or more peripheral devices while being unaware of the host apparatus, and to act as a master device interacting directly with the one or more peripheral devices.
    Type: Grant
    Filed: March 26, 2010
    Date of Patent: March 1, 2016
    Assignee: QUALCOMM INCORPORATED
    Inventors: Alexander Gantman, Gregory Rose, Jack Steenstra, Liren Chen, Adam J. Drew
  • Patent number: 9262627
    Abstract: Methods, devices, and systems for detecting return-oriented programming (ROP) exploits are disclosed. A system includes a processor, a main memory, and a cache memory. A cache monitor develops an instruction loading profile by monitoring accesses to cached instructions found in the cache memory and misses to instructions not currently in the cache memory. A remedial action unit terminates execution of one or more of the valid code sequences if the instruction loading profile is indicative of execution of an ROP exploit involving one or more valid code sequences. The instruction loading profile may be a hit/miss ratio derived from monitoring cache hits relative to cache misses. The ROP exploits may include code snippets that each include an executable instruction and a return instruction from valid code sequences.
    Type: Grant
    Filed: August 29, 2014
    Date of Patent: February 16, 2016
    Assignee: QUALCOMM Incorporated
    Inventors: Daniel Komaromy, Alexander Gantman, Brian Rosenberg, Arun Balakrishnan, Renwei Ge, Gregory Rose, Anand Palanigounder
  • Publication number: 20140372701
    Abstract: Methods, devices, and systems for detecting return-oriented programming (ROP) exploits are disclosed. A system includes a processor, a main memory, and a cache memory. A cache monitor develops an instruction loading profile by monitoring accesses to cached instructions found in the cache memory and misses to instructions not currently in the cache memory. A remedial action unit terminates execution of one or more of the valid code sequences if the instruction loading profile is indicative of execution of an ROP exploit involving one or more valid code sequences. The instruction loading profile may be a hit/miss ratio derived from monitoring cache hits relative to cache misses. The ROP exploits may include code snippets that each include an executable instruction and a return instruction from valid code sequences.
    Type: Application
    Filed: August 29, 2014
    Publication date: December 18, 2014
    Inventors: Daniel KOMAROMY, Alexander Gantman, Brian Rosenberg, Arun Balakrishnan, Renwei Ge, Gregory Rose, Anand Palanigounder
  • Patent number: 8391480
    Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.
    Type: Grant
    Filed: February 3, 2009
    Date of Patent: March 5, 2013
    Assignee: QUALCOMM Incorporated
    Inventors: Jack Steenstra, Alexander Gantman, John W. Noerenberg, II, Ahmad Jalali, Gregory Rose
  • Publication number: 20110238998
    Abstract: A portable self-contained node computer is provided. The portable self-contained node computer connects to a host computer. The host computer allows the portable node computer to access its peripheral input/output devices.
    Type: Application
    Filed: March 26, 2010
    Publication date: September 29, 2011
    Applicant: QUALCOMM Incorporated
    Inventors: Alexander Gantman, Gregory Rose, Jack Steenstra, Liren Chen, Adam J. Drew
  • Publication number: 20080013730
    Abstract: A method and apparatus for re-synchronizing a stream cipher during soft handoff. Transmitted quasi-secret keying information is used with a secret key to reinitialize a stream cipher generator located in a base station and a stream cipher generator located in a travelling mobile station. Since the quasi-secret keying information is uniquely determined according to each base station in the wireless telephone system, a base station's quasi-secret keying information and a shared secret key can also be used to create a new key. Thus, as the mobile station travels from one base station to another base station, a unique new key is generated for each base station.
    Type: Application
    Filed: December 22, 2006
    Publication date: January 17, 2008
    Inventor: Gregory Rose
  • Publication number: 20070287386
    Abstract: Various operations may be performed based on a distance-related function associated with two or more devices. For example, an association procedure for two or more devices may be based on one or more determined distances. Similarly, presence management may be based on one or more determined distances. A distance-related function may take various form including, for example, a distance between devices, two or more distances between devices, a rate of change in a relative distance between devices, relative acceleration between devices, or some combination of two or more of the these distance-related functions.
    Type: Application
    Filed: March 27, 2007
    Publication date: December 13, 2007
    Applicant: QUALCOMM INCORPORATED
    Inventors: Avneesh Agrawal, Chong Lee, Kamram Moallemi, David Julian, Manuel Jaime, Robert Douglas, Gregory Rose, Lu Xiao
  • Publication number: 20070259690
    Abstract: Various operations may be performed based on a distance-related function associated with two or more devices. For example, an association procedure for two or more devices may be based on one or more determined distances. Similarly, presence management may be based on one or more determined distances. A distance-related function may take various form including, for example, a distance between devices, two or more distances between devices, a rate of change in a relative distance between devices, relative acceleration between devices, or some combination of two or more of the these distance-related functions.
    Type: Application
    Filed: March 27, 2007
    Publication date: November 8, 2007
    Applicant: QUALCOMM INCORPORATED
    Inventors: David Julian, Chong Lee, Kamram Moallemi, Avneesh Agrawal, Manuel Jaime, Robert Douglas, Lu Xiao, Gregory Rose
  • Publication number: 20070249288
    Abstract: Various operations may be performed based on distance-related functions associated with two or more devices. For example, one or more distance-based functions may be used to control whether a device is allowed to request another device to perform one or more functions. Similarly, one or more distance-based functions may be used to control whether a device may perform one or more functions requested by another device. A distance-related function may take various form including, for example, a distance between devices, two or more distances between devices, a rate of change in a relative distance between devices, relative acceleration between devices, or some combination of two or more of the these distance-related functions.
    Type: Application
    Filed: April 11, 2007
    Publication date: October 25, 2007
    Inventors: Kamran Moallemi, Amal Ekbal, Chong Lee, David Julian, Gregory Rose, Lu Xiao
  • Publication number: 20070230694
    Abstract: A cryptographically secure pseudo-random number generator is configured to obtain one or more unpredictable sources of entropy that provide a seed. A current internal state of the number generator is modified as a function of the current internal state and the seed to accumulate entropy. The modified internal state may be obtained by using non-linear feedback shift register operations on the internal state and the seed. A pseudo-random number is then generated based on the modified internal state of the number generator. The one or more unpredictable sources of entropy may be combined into the seed. The internal state of the number generator may be continually modified with additional seeds obtained from the one or more unpredictable sources and the current internal state. Additionally, the internal state of the number generator may be modified on demand with a new seed received from a calling application.
    Type: Application
    Filed: August 23, 2006
    Publication date: October 4, 2007
    Inventors: Gregory Rose, Alexander Gantman, Lu Xiao
  • Publication number: 20070234042
    Abstract: One feature provides a method for granting authenticated access to off-line, limited-resource mobile devices. A public-private key pair is generated by a service provider and the public key is used to digitally sign a username and (possibly) access privileges to obtain a password for technician. The public key is securely distributed to mobile devices. When off-line, a mobile device may authenticate access to restricted functions of the mobile device by a technician. The technician provides its username, access privileges and password to the mobile device. The mobile device then uses the public key, username and access privileges to verify the password. To invalidate an old username and password, the service provider replaces the public-private key pair with a new public-private key pair.
    Type: Application
    Filed: December 11, 2006
    Publication date: October 4, 2007
    Inventors: Alexander Gantman, Gregory Rose
  • Publication number: 20070223706
    Abstract: A feature is provided that facilitates securely creating, and/or replacing cryptographic keys. A first key pair is created comprising first private key and first public key. A second (spare) key pair is created comprising second private key and second public key. The second key pair is associated with the first private key. The second key pair is divided into shares and distributed to at least two shareholders. When the first key pair is to be replace, the second key pair is recreated and authenticated with at least a portion of the distributed shares. A trust level is associated with the second key pair corresponding to a trust level of the first key pair. The first key pair may be invalidated upon authentication of the second key pair. Further configurations provide for the creation of additional spare key pairs.
    Type: Application
    Filed: December 11, 2006
    Publication date: September 27, 2007
    Inventors: Alexander Gantman, Gregory Rose
  • Publication number: 20070207873
    Abstract: A infrared method and apparatus for the kinematic analysis of a golfer is disclosed. The method includes selectively positioning a plurality of infrared markers on a golfer, and optionally on a golf club. Images of the golfer may be acquired before, during, and after he/she swings the golf club. The images may be analyzed to determine the kinematic characteristics of the movement of the golfer's body parts. A kinematic analysis of the golfer's body parts may then be correlated with a kinematic analysis of the golf club. The method and apparatus disclosed herein provide the advantage of allowing a golfer's movement to be correlated with a kinematic analysis of their golf swing while minimizing the physical restrictions on the golfer's movement.
    Type: Application
    Filed: March 1, 2006
    Publication date: September 6, 2007
    Inventor: Gregory Rose
  • Patent number: 7254728
    Abstract: Power saving method is achieved by weakly holding a signal line in its last in time state, which is responsive to and may be overcome by the state of an external signal. During sleep mode, the weakly held signal line state tracks and holds the external signal using alternatively a controllable weak pull-up or pull-down device, such that weakly held state may be driven to a different state by the external driving signal with slight power consumption. When sleep mode is off, the keeper function is disabled and the signal line maybe driven alternatively internally or externally depending upon the state of an enable line.
    Type: Grant
    Filed: March 21, 2006
    Date of Patent: August 7, 2007
    Assignee: Intel Corporation
    Inventors: Gregory Rose, James R. Feddeler, Zahid Ahsanullah