Patents by Inventor Gregory A. Rose

Gregory A. Rose has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12102253
    Abstract: There is disclosed herein a sous vide appliance (10) including: a tube (12) having longitudinally opposite first and second ends (14, 13), and providing a liquid flow path (26) having an inlet adjacent the first end (14), and an outlet adjacent the second end (13); a heating element (31) mounted adjacent the tube (12) to heat liquid passing along the flow path from the inlet to the outlet; an outer housing (11) within which the tube (12) is located; and a switch (32) located between the tube (12) and the housing (11) and operatively associated with the heating element (31) to provide for the delivery of electric power to the heating element (31).
    Type: Grant
    Filed: March 29, 2019
    Date of Patent: October 1, 2024
    Assignee: BREVILLE PTY LIMITED
    Inventors: Brendan Foxlee, Gregory Upston, Lichan Meng, Marian Silviu Rosian, Vyvyan Rose, William Shen
  • Publication number: 20240299580
    Abstract: Provided herein are pharmaceutical compositions comprising a lipid nanoparticle (LNP) and a therapeutic nucleic acid (TNA), wherein the LNP comprises an ApoE polypeptide, or a fragment thereof and/or an ApoB polypeptide, or a fragment thereof, linked to the LNP, and at least one pharmaceutically acceptable excipient. The ApoE polypeptide, or the fragment thereof, and/or the ApoB polypeptide, or the fragment thereof, are capable of binding a low-density lipoprotein (LDL) receptor, or LDL receptor family member, advantageously providing LNP compositions that can be directed to any cell or tissue expressing the LDL receptor.
    Type: Application
    Filed: June 7, 2022
    Publication date: September 12, 2024
    Inventors: Michelle LeBlanc, Gregory Feinstein, Randall Newton Toy, Birte Nolting, Nathaniel Silver, Phillip Samayoa, Jon Edward Chatterton, Matthew Manganiello, Douglas A. Rose, Ryan M. Delaney
  • Publication number: 20240248937
    Abstract: In embodiments, a method for an Online Software Platform (OSP) computer system includes receiving datasets having dataset values that represent relationship instance data of relationship instances between a client primary entity and other secondary entities, selecting digital rules responsive to these dataset values, producing resources for the datasets by applying the selected digital rules to the dataset values, deriving a total value of the produced resources, generating a report document that mentions at least the derived the total value, and preparing an instantiation that enables viewing a data record that substantiates the derived total value. The method may further include making this instantiation available for viewing to a domain entity that has access to the report document and wants to confirm the derived total value.
    Type: Application
    Filed: April 3, 2024
    Publication date: July 25, 2024
    Applicant: Avalara, Inc.
    Inventors: Bilkay ROSE, Mark JANZEN, Naveen Kumar AGRAWAL, Denis GULSEN, Gregory T. KAVOUNAS, Heidi GENEST, Erik van der HOEVEN, Tracy BARNEY, Yvonne SEIDL, Scott SEELY, Thomas GOLDSCHMIDT
  • Publication number: 20210290190
    Abstract: An anatomical measurement device and method enables a medical professional to obtain anatomical measurements of a patient. The anatomical measurements may be obtained directly from the patient or from a radiographic image, such as an x-ray, using the measurement device. The measurement device includes a base that includes a linear portion joining branches at each end of the base. The branches may extend perpendicularly to the linear portion. A handle extends at an angle from a first side of the base's linear portion and a protractor arm extends from the opposite side of the base's linear portion. The position and angle of the protractor arm may be adjusted along at least a portion of the length of the base's linear portion. Each of the branches, the linear portion, and the protractor arm may include respective scales to enable the medical professional to take measurements.
    Type: Application
    Filed: March 17, 2020
    Publication date: September 23, 2021
    Inventors: Steven Rose, Gregory Rose
  • Publication number: 20190333173
    Abstract: Described are medias, systems, and computer-implemented methods to detect improper residency status by performing a data mining task to data source to detect one or more improper residency indicia, applying a machine learning algorithm to identify an initial candidate, calculating a probability that the initial candidate has an improper residency status, and validating the detection. Further described are medias, systems, and computer-implemented methods to detect improper occupancy tax status.
    Type: Application
    Filed: April 26, 2019
    Publication date: October 31, 2019
    Inventors: Gregory ROSE, Jessica FLANAGAN, Anthony MORIARTY
  • Publication number: 20190333175
    Abstract: Described are applications and methods to detect a real estate transfer event and validate the detected event from a data set ingested from a plurality of unique external data sources by identifying an initial candidate, determining the probability that the improper real estate transfer event has taken place, and validating the probability of the improper real estate event.
    Type: Application
    Filed: April 26, 2019
    Publication date: October 31, 2019
    Inventors: Gregory ROSE, Nickolas DEL PEGO, Brian FINK, James CHRISTOPHER
  • Publication number: 20190332961
    Abstract: Described are media, systems, and methods to detect an unpermitted renovation event and validate the detected event from a data set ingested from a plurality of unique external data sources by identifying candidate renovations, determining the probability and timing of an unpermitted renovation associated with the candidate renovation, and validating the probability and timing of the unpermitted renovation. Further described are applications and methods to prioritize inspection of unpermitted renovation candidates and validate the prioritization.
    Type: Application
    Filed: April 26, 2019
    Publication date: October 31, 2019
    Inventors: Gregory ROSE, Neil SENTURIA, Neil DUTTA
  • Publication number: 20160210160
    Abstract: A portable self-contained node computer is provided. The portable self-contained node computer connects to a host computer. The host computer allows the portable node computer to access its peripheral input/output devices.
    Type: Application
    Filed: February 25, 2016
    Publication date: July 21, 2016
    Inventors: Alexander GANTMAN, Gregory ROSE, Jack STEENSTRA, Liren CHEN, Adam J. DREW
  • Patent number: 9274815
    Abstract: A portable self-contained node apparatus establishes a connection to a host apparatus having one or more peripheral devices connected directly thereto. The node apparatus is configured to view the one or more peripheral devices while being unaware of the host apparatus, and to act as a master device interacting directly with the one or more peripheral devices.
    Type: Grant
    Filed: March 26, 2010
    Date of Patent: March 1, 2016
    Assignee: QUALCOMM INCORPORATED
    Inventors: Alexander Gantman, Gregory Rose, Jack Steenstra, Liren Chen, Adam J. Drew
  • Patent number: 9262627
    Abstract: Methods, devices, and systems for detecting return-oriented programming (ROP) exploits are disclosed. A system includes a processor, a main memory, and a cache memory. A cache monitor develops an instruction loading profile by monitoring accesses to cached instructions found in the cache memory and misses to instructions not currently in the cache memory. A remedial action unit terminates execution of one or more of the valid code sequences if the instruction loading profile is indicative of execution of an ROP exploit involving one or more valid code sequences. The instruction loading profile may be a hit/miss ratio derived from monitoring cache hits relative to cache misses. The ROP exploits may include code snippets that each include an executable instruction and a return instruction from valid code sequences.
    Type: Grant
    Filed: August 29, 2014
    Date of Patent: February 16, 2016
    Assignee: QUALCOMM Incorporated
    Inventors: Daniel Komaromy, Alexander Gantman, Brian Rosenberg, Arun Balakrishnan, Renwei Ge, Gregory Rose, Anand Palanigounder
  • Publication number: 20140372701
    Abstract: Methods, devices, and systems for detecting return-oriented programming (ROP) exploits are disclosed. A system includes a processor, a main memory, and a cache memory. A cache monitor develops an instruction loading profile by monitoring accesses to cached instructions found in the cache memory and misses to instructions not currently in the cache memory. A remedial action unit terminates execution of one or more of the valid code sequences if the instruction loading profile is indicative of execution of an ROP exploit involving one or more valid code sequences. The instruction loading profile may be a hit/miss ratio derived from monitoring cache hits relative to cache misses. The ROP exploits may include code snippets that each include an executable instruction and a return instruction from valid code sequences.
    Type: Application
    Filed: August 29, 2014
    Publication date: December 18, 2014
    Inventors: Daniel KOMAROMY, Alexander Gantman, Brian Rosenberg, Arun Balakrishnan, Renwei Ge, Gregory Rose, Anand Palanigounder
  • Patent number: 8391480
    Abstract: Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.
    Type: Grant
    Filed: February 3, 2009
    Date of Patent: March 5, 2013
    Assignee: QUALCOMM Incorporated
    Inventors: Jack Steenstra, Alexander Gantman, John W. Noerenberg, II, Ahmad Jalali, Gregory Rose
  • Publication number: 20110238998
    Abstract: A portable self-contained node computer is provided. The portable self-contained node computer connects to a host computer. The host computer allows the portable node computer to access its peripheral input/output devices.
    Type: Application
    Filed: March 26, 2010
    Publication date: September 29, 2011
    Applicant: QUALCOMM Incorporated
    Inventors: Alexander Gantman, Gregory Rose, Jack Steenstra, Liren Chen, Adam J. Drew
  • Publication number: 20080013730
    Abstract: A method and apparatus for re-synchronizing a stream cipher during soft handoff. Transmitted quasi-secret keying information is used with a secret key to reinitialize a stream cipher generator located in a base station and a stream cipher generator located in a travelling mobile station. Since the quasi-secret keying information is uniquely determined according to each base station in the wireless telephone system, a base station's quasi-secret keying information and a shared secret key can also be used to create a new key. Thus, as the mobile station travels from one base station to another base station, a unique new key is generated for each base station.
    Type: Application
    Filed: December 22, 2006
    Publication date: January 17, 2008
    Inventor: Gregory Rose
  • Publication number: 20070287386
    Abstract: Various operations may be performed based on a distance-related function associated with two or more devices. For example, an association procedure for two or more devices may be based on one or more determined distances. Similarly, presence management may be based on one or more determined distances. A distance-related function may take various form including, for example, a distance between devices, two or more distances between devices, a rate of change in a relative distance between devices, relative acceleration between devices, or some combination of two or more of the these distance-related functions.
    Type: Application
    Filed: March 27, 2007
    Publication date: December 13, 2007
    Applicant: QUALCOMM INCORPORATED
    Inventors: Avneesh Agrawal, Chong Lee, Kamram Moallemi, David Julian, Manuel Jaime, Robert Douglas, Gregory Rose, Lu Xiao
  • Publication number: 20070259690
    Abstract: Various operations may be performed based on a distance-related function associated with two or more devices. For example, an association procedure for two or more devices may be based on one or more determined distances. Similarly, presence management may be based on one or more determined distances. A distance-related function may take various form including, for example, a distance between devices, two or more distances between devices, a rate of change in a relative distance between devices, relative acceleration between devices, or some combination of two or more of the these distance-related functions.
    Type: Application
    Filed: March 27, 2007
    Publication date: November 8, 2007
    Applicant: QUALCOMM INCORPORATED
    Inventors: David Julian, Chong Lee, Kamram Moallemi, Avneesh Agrawal, Manuel Jaime, Robert Douglas, Lu Xiao, Gregory Rose
  • Publication number: 20070249288
    Abstract: Various operations may be performed based on distance-related functions associated with two or more devices. For example, one or more distance-based functions may be used to control whether a device is allowed to request another device to perform one or more functions. Similarly, one or more distance-based functions may be used to control whether a device may perform one or more functions requested by another device. A distance-related function may take various form including, for example, a distance between devices, two or more distances between devices, a rate of change in a relative distance between devices, relative acceleration between devices, or some combination of two or more of the these distance-related functions.
    Type: Application
    Filed: April 11, 2007
    Publication date: October 25, 2007
    Inventors: Kamran Moallemi, Amal Ekbal, Chong Lee, David Julian, Gregory Rose, Lu Xiao
  • Publication number: 20070234042
    Abstract: One feature provides a method for granting authenticated access to off-line, limited-resource mobile devices. A public-private key pair is generated by a service provider and the public key is used to digitally sign a username and (possibly) access privileges to obtain a password for technician. The public key is securely distributed to mobile devices. When off-line, a mobile device may authenticate access to restricted functions of the mobile device by a technician. The technician provides its username, access privileges and password to the mobile device. The mobile device then uses the public key, username and access privileges to verify the password. To invalidate an old username and password, the service provider replaces the public-private key pair with a new public-private key pair.
    Type: Application
    Filed: December 11, 2006
    Publication date: October 4, 2007
    Inventors: Alexander Gantman, Gregory Rose
  • Publication number: 20070230694
    Abstract: A cryptographically secure pseudo-random number generator is configured to obtain one or more unpredictable sources of entropy that provide a seed. A current internal state of the number generator is modified as a function of the current internal state and the seed to accumulate entropy. The modified internal state may be obtained by using non-linear feedback shift register operations on the internal state and the seed. A pseudo-random number is then generated based on the modified internal state of the number generator. The one or more unpredictable sources of entropy may be combined into the seed. The internal state of the number generator may be continually modified with additional seeds obtained from the one or more unpredictable sources and the current internal state. Additionally, the internal state of the number generator may be modified on demand with a new seed received from a calling application.
    Type: Application
    Filed: August 23, 2006
    Publication date: October 4, 2007
    Inventors: Gregory Rose, Alexander Gantman, Lu Xiao
  • Publication number: 20070223706
    Abstract: A feature is provided that facilitates securely creating, and/or replacing cryptographic keys. A first key pair is created comprising first private key and first public key. A second (spare) key pair is created comprising second private key and second public key. The second key pair is associated with the first private key. The second key pair is divided into shares and distributed to at least two shareholders. When the first key pair is to be replace, the second key pair is recreated and authenticated with at least a portion of the distributed shares. A trust level is associated with the second key pair corresponding to a trust level of the first key pair. The first key pair may be invalidated upon authentication of the second key pair. Further configurations provide for the creation of additional spare key pairs.
    Type: Application
    Filed: December 11, 2006
    Publication date: September 27, 2007
    Inventors: Alexander Gantman, Gregory Rose