Patents by Inventor Jacob TORREY
Jacob TORREY has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230112778Abstract: An object processing system is disclosed that includes an object induction station at which objects are provided for processing. The object induction station includes at least one perception unit for providing perception data regarding an object, and an object processing system for receiving objects from the object induction station, and for urging an object into a first end of one of a plurality of chute location, each of which including a first end that is accessible by the carrier and a second end that is accessible by a mobile destination container of a plurality of mobile destination containers.Type: ApplicationFiled: October 13, 2022Publication date: April 13, 2023Inventors: Ryan O'HERN, Joseph Romano, Craig Hattabaugh, John Richard Amend, JR., Jacob Torrey, Jeffrey Kittredge, Sara Laprade, Sarah Myers, Joshua Best, Christopher Buck, Thomas Allen
-
Publication number: 20220356017Abstract: An operator inducted object processing system is disclosed that includes an object induction station at which objects are provided for processing, said object induction station including at least one perception unit for providing perception data regarding an object, an object processing system for receiving objects from the object induction station, said object processing system including a carrier configured for movement in a first generally horizontal direction between two mutually opposing arrays of destination locations, each of which extends along the first generally horizontal direction, and the carrier also being configured for movement in a second generally vertical direction between the two mutually opposing arrays of destination locations, each of which also extends along the second generally vertical direction, wherein the movement in the first generally horizontal direction is independent of the movement in the second generally vertical direction, and wherein the carrier is further configured forType: ApplicationFiled: May 6, 2022Publication date: November 10, 2022Inventors: Joseph ROMANO, Christopher BUCK, Thomas ALLEN, Christopher GEYER, Victoria HINCHEY, Charles BAPTISTA, Jacob TORREY, Ryan O'HERN, Andrew EWART, John Richard AMEND, JR., Prasanna VELAGAPUDI, Benjamin COHEN, Guoming Alex LONG
-
Patent number: 10523635Abstract: Obtaining, in association with origination of outbound network traffic to be sent by a system, user account information of a user account on behalf of which the outbound network traffic is generated, and performing filtering of the outbound network traffic based on the obtained user account information of the user account on behalf of which the outbound network traffic is generated, where the filtering is further based on one or more rules, and the filtering includes determining whether to block or allow sending of the outbound network traffic from the system.Type: GrantFiled: June 17, 2016Date of Patent: December 31, 2019Assignee: ASSURED INFORMATION SECURITY, INC.Inventors: Jared Wright, Jacob Torrey
-
Publication number: 20170366505Abstract: Obtaining, in association with origination of outbound network traffic to be sent by a system, user account information of a user account on behalf of which the outbound network traffic is generated, and performing filtering of the outbound network traffic based on the obtained user account information of the user account on behalf of which the outbound network traffic is generated, where the filtering is further based on one or more rules, and the filtering includes determining whether to block or allow sending of the outbound network traffic from the system.Type: ApplicationFiled: June 17, 2016Publication date: December 21, 2017Applicant: Assured Information Security, Inc.Inventors: Jared Wright, Jacob Torrey
-
Patent number: 9639671Abstract: Provided are facilities for secure execution of an encrypted executable comprising an encrypted instruction. The secure execution includes obtaining the encrypted instruction, decrypting the encrypted instruction using a decryption key being maintained in a secure location within a processor, and storing the decrypted instruction to a secure storage for execution, where the decryption key remains in the secure location during the decrypting and the storing to facilitate maintaining security of the decryption key.Type: GrantFiled: May 27, 2014Date of Patent: May 2, 2017Assignee: ASSURED INFORMATION SECURITY, INC.Inventor: Jacob Torrey
-
Publication number: 20150347724Abstract: Provided are facilities for secure execution of an encrypted executable comprising an encrypted instruction. The secure execution includes obtaining the encrypted instruction, decrypting the encrypted instruction using a decryption key being maintained in a secure location within a processor, and storing the decrypted instruction to a secure storage for execution, where the decryption key remains in the secure location during the decrypting and the storing to facilitate maintaining security of the decryption key.Type: ApplicationFiled: May 27, 2014Publication date: December 3, 2015Applicant: Assured Information Security, Inc.Inventor: Jacob TORREY
-
Patent number: 8966642Abstract: Verification of trustworthiness of a computing platform is provided. The trustworthiness of the computing platform is dynamically assessed to determine whether a root of trust exists on the computing platform. Responsive to determining existence of the root of trust, data is unsealed from a sealed storage facility. The sealed storage facility is unsealed responsive to a root of trust being determined to exist on the computing platform. The data can be used to attest to the trustworthiness of the computing platform to other device on a network.Type: GrantFiled: March 30, 2012Date of Patent: February 24, 2015Assignee: Assured Information Security, Inc.Inventors: Rian Quinn, Jacob Torrey
-
Patent number: 8856789Abstract: Trusted execution of a self-modifying executable is facilitated. An attempt to access a data portion of a self-modifying executable during execution of the self-modifying executable is detected. The self-modifying executable includes the data portion, for storing data to be accessed during execution of the self-modifying executable, and an instruction portion including instructions for execution of the self-modifying executable. The attempt to access the data portion is retargeted to a separate portion of memory space that is separate from another portion of memory space in which the self-modifying executable is loaded for execution. Meaningful measurability of the integrity of the self-modifying executable is thereby provided.Type: GrantFiled: September 6, 2012Date of Patent: October 7, 2014Assignee: Assured Information Security, Inc.Inventor: Jacob Torrey
-
Publication number: 20140068612Abstract: Trusted execution of a self-modifying executable is facilitated. An attempt to access a data portion of a self-modifying executable during execution of the self-modifying executable is detected. The self-modifying executable includes the data portion, for storing data to be accessed during execution of the self-modifying executable, and an instruction portion including instructions for execution of the self-modifying executable. The attempt to access the data portion is retargeted to a separate portion of memory space that is separate from another portion of memory space in which the self-modifying executable is loaded for execution. Meaningful measurability of the integrity of the self-modifying executable is thereby provided.Type: ApplicationFiled: September 6, 2012Publication date: March 6, 2014Applicant: ASSURED INFORMATION SECURITY, INC.Inventor: Jacob TORREY
-
Publication number: 20120260345Abstract: Verification of trustworthiness of a computing platform is provided. The trustworthiness of the computing platform is dynamically assessed to determine whether a root of trust exists on the computing platform. Responsive to determining existence of the root of trust, data is unsealed from a sealed storage facility. The sealed storage facility is unsealed responsive to a root of trust being determined to exist on the computing platform. The data can be used to attest to the trustworthiness of the computing platform to other device on a network.Type: ApplicationFiled: March 30, 2012Publication date: October 11, 2012Applicant: ASSURED INFORMATION SECURITY, INC.Inventors: Rian QUINN, Jacob TORREY