Patents by Inventor James A. Howard
James A. Howard has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240143725Abstract: A method of determining trust in a supply item in an imaging device for verifying other supply items installed in the imaging device via an algorithm, wherein the imaging device has a plurality of installed supply items. The method comprises: sending challenge data and an indication of the algorithm to a candidate supply item, receiving a challenge response from the candidate supply item, and determining, by the controller, a status of the challenge response, the status being verified or unverified. When the controller determines that the received challenge response is a correct output of the algorithm when the challenge data is input to the algorithm, the status is determined as verified. Further, an imaging device configured to determine trust in a supply item installed in the imaging device for verifying other supply items installed in the imaging device via an algorithm.Type: ApplicationFiled: January 27, 2023Publication date: May 2, 2024Inventors: Samuel Davidson, James Howard Ellis, Zachary Nathan Fister, Timothy John Rademacher, Jennifer Topmiller Williams
-
Publication number: 20240143844Abstract: A method of authenticating a supply item in an imaging device, wherein the supply item is designated as a prover supply item, and a second supply item installed in the imaging device is designated as a verifier supply item. The method comprises: receiving a challenge response from the prover supply item and determining a status of the challenge response. When the verifier supply item determines that the received challenge response is a correct output of an algorithm when challenge data is input to the algorithm, the status is determined as verified. The verifier supply item is disclosed, configured to receive a challenge response from a prover supply item installed in the imaging device, and determine a status of the challenge response. When the verifier supply item determines that the received challenge response is a correct output of an algorithm, the status is determined as verified.Type: ApplicationFiled: January 27, 2023Publication date: May 2, 2024Inventors: Samuel Davidson, James Howard Ellis, Zachary Nathan Fister, Timothy John Rademacher, Jennifer Topmiller Williams
-
Publication number: 20240143726Abstract: An imaging device comprising a controller, a prover supply item and a verifier supply item, where the imaging device is configured to authenticate the prover supply item by: sending a challenge response from the prover supply item to the verifier supply item, and determining a status of the challenge response. When the verifier supply item determines that the received challenge response is a correct output of an algorithm when challenge data is input to the algorithm, the status is determined as verified. A supply item configured to be operable as a prover supply item when installed in an imaging device. The prover supply item is configured to receive an indication of an algorithm to be performed and receive challenge data, perform the algorithm using the challenge data as input to determine a challenge response, and send the challenge response to a verifier supply item.Type: ApplicationFiled: January 27, 2023Publication date: May 2, 2024Inventors: Samuel Davidson, James Howard Ellis, Zachary Nathan Fister, Timothy John Rademacher, Jennifer Topmiller Williams
-
Patent number: 11973860Abstract: Systems and methods for initiating an action based on electronic activities of a user. Generally, a computing device receives a policy for enabling cryptographically secure tracking of electronic activities of a user and a particular electronic computing device. The policy can include definitions for a multiple actions to be taken with respect to certain electronic activities resulting from interaction by the user with the at least one computing device. The computing device can identify a particular electronic activity resulting from user interaction with the at least one computing device. The computing device can determine a particular action to take by applying the policy to the particular electronic activity. The computing device can initiate the particular action with respect to the particular electronic activity.Type: GrantFiled: June 24, 2022Date of Patent: April 30, 2024Assignee: lonic Security Inc.Inventors: Adam Ghetti, Jeffrey Howard, James Jordan, Nicholas Smith, Jeremy Eckman, Ryan Speers, Sohaib Bhatti
-
Patent number: 11957446Abstract: Certain aspects relate to systems and techniques for medical instrument navigation and targeting. In one aspect, a system includes a medical instrument having an elongate body and at least one sensor, a display, a processor, and a memory storing a model of a mapped portion of a luminal network and a position of a target with respect to the model. The processor may be configured to: determine, based on data from the at least one sensor, a position and orientation of a distal end of the medical instrument with respect to the model, and cause, on at least a portion of the display, a rendering of the model, the position of the target, and the position and orientation of the distal end of the medical instrument. The rendering may be based on a viewpoint directed at the target and different from a viewpoint of the medical instrument.Type: GrantFiled: November 13, 2020Date of Patent: April 16, 2024Assignee: Auris Health, Inc.Inventors: Hedyeh Rafii-Tari, Prasanth Jeevan, Douglas T. Boyd, Melissa A. Teran, Alexander James Sheehy, Nicolas E. Robert, Miroslav Drahos, Jeffery D. Howard, Andrew Esbenshade Zeldis, René Ango Mambembe
-
Patent number: 11945785Abstract: Disclosed herein are heterocyclic compounds, for example, according to the following formula and analogs thereof: that inhibit the activity of FLT3. Also described are specific covalent inhibitors of FLT3. Also disclosed are pharmaceutical compositions that include the compounds. Methods of using the FLT3 inhibitors are disclosed, alone or in combination with other therapeutic agents, for the treatment of proliferative diseases or conditions, including hematological malignancies and other diseases or conditions dependent on FLT3 activity.Type: GrantFiled: December 29, 2022Date of Patent: April 2, 2024Assignee: Biomea Fusion, Inc.Inventors: David Sperandio, Xiaodong Wang, Thorsten A. Kirschberg, James T. Palmer, Thomas Butler, Solomon B. Ungashe, Neil Howard Squires, Nan-Horng Lin, Ravindra B. Upasani, Amna Trinity-Turjuman Adam, Yongli Su, Thu Phan
-
Patent number: 11946503Abstract: A connector is provided to attach a supported member to a supporting member, with the supported member being in sloped and skewed relation to the supporting member. The connector has back members attached to side members. A seat member attaches to the side members through a hinged connection. The seat member interfaces with the bottom face of the supported member and can be disposed at a sloped angle. A pair of seat side members extend from the seat member.Type: GrantFiled: January 14, 2020Date of Patent: April 2, 2024Assignee: Simpson Strong-Tie Company Inc.Inventors: Thomas G. Evans, Dustin P. Muhn, Rachel Marie Holland, Benedict Ang, Paul Howard Oellerich, James M. Benton, Timothy Patrick Murphy
-
Publication number: 20240106864Abstract: A cloud-based security service that includes external evaluation for accessing a third-party application. The security service receives a request to access a third-party application from a client device. The security service enforces a set of one or more access policies configured for the third-party application including an external evaluation rule. As part of enforcing the external evaluation rule, the security service transmits an external evaluation request to an external endpoint defined in the external evaluation rule. The external evaluation request includes an identity of a user associated with the request. The security service receives the result of the external evaluation. If the external evaluation passed, the security service grants access to the third-party application based at least in part on its passing.Type: ApplicationFiled: December 4, 2023Publication date: March 28, 2024Inventor: James Howard Royal
-
Patent number: 11939321Abstract: The invention provides a compound of formula (0): or a pharmaceutically acceptable salt, N-oxide or tautomer thereof; wherein: n is 1 or 2; X is CH or N; Y is selected from CH and C—F; Z is selected from C—Rz and N; R1 is selected from: -(Alk1)t-Cyc1; wherein t is 0 or 1; Optionally substituted C1-6 acyclic hydrocarbon groups R2 is selected from hydrogen; halogen; and C1-3 hydrocarbon groups optionally substituted with one or more fluorine atoms; R3 is hydrogen or a group L1-R7; R4 is selected from hydrogen; methoxy; and optionally substituted C1-3 alkyl; and R4a is selected from hydrogen and a C1-3 alkyl group; wherein Rz, Alk1, Cyc1, L1 and R7 are defined herein; provided that the compound is other than 6-benzyl-3-{2-[(2-methylpyrimidin-4-yl)amino]pyridin-4-yl}-7,8-dihydro-1,6-naphthyridin-5(6H)-one and 3-{2-[(2-methylpyrimidin-4-yl)amino]pyridin-4-yl}-7,8-dihydro-1,6-naphthyridin-5(6H)-one and salts and tautomers thereof.Type: GrantFiled: April 7, 2021Date of Patent: March 26, 2024Assignee: OTSUKA PHARMACEUTICAL CO., LTD.Inventors: Valerio Berdini, Ildiko Maria Buck, James Edward Harvey Day, Charlotte Mary Griffiths-Jones, Thomas Daniel Heightman, Steven Howard, Christopher William Murray, David Norton, Marc O'Reilly, Alison Jo-Anne Woolford, Michael Liam Cooke, David Cousin, Stuart Thomas Onions, Jonathan Martin Shannon, John Paul Watts
-
Patent number: 11935151Abstract: Examples described herein relate to a graphics processing system that includes one or more integrated graphics systems and one or more discrete graphics systems. In some examples, an operating system (OS) or other software supports switching between image display data being provided from either an integrated graphics system or a discrete graphics system by configuring a multiplexer at runtime to output image data to a display. In some examples, a multiplexer is not used and interface supported messages are used to transfer image data from an integrated graphics system to a discrete graphics system and the discrete graphics system generates and outputs image data to a display. In some examples, interface supported messages are used to transfer image data from a discrete graphics system to an integrated graphics system and the integrated graphics system uses an overlay process to generate a composite image for output to a display.Type: GrantFiled: July 7, 2022Date of Patent: March 19, 2024Assignee: Intel CorporationInventors: James E. Akiyama, John Howard, Murali Ramadoss, Gary K. Smith, Todd M. Witter, Satish Ramanathan, Zhengmin Li
-
Publication number: 20240089199Abstract: A primary internet connection via a gateway or router located at a premises may be used to route internet traffic from devices located at the premises. A change in the primary internet connection, such as a loss or a degradation of the connection, may occur. Based on the change in the primary internet connection, metrics of alternative internet connections, such as cellular or hotspot connections, may be used to select one of the alternative internet connections. Internet traffic may be routed via the selected alternative internet connection until the primary internet connection is reestablished or improves.Type: ApplicationFiled: November 17, 2023Publication date: March 14, 2024Inventor: James Howard STEPHENS, JR.
-
Publication number: 20240078129Abstract: An example non-transitory machine-readable medium includes instructions that cause a processor of a computing device to create a first virtual machine using a hypervisor, execute a trusted basic input/output system (BIOS) in the first virtual machine, create a second virtual machine using the hypervisor, and execute an untrusted BIOS component in the second virtual machine. The first virtual machine is executed with a greater privilege to access a resource of the computing device than the second virtual machine.Type: ApplicationFiled: January 29, 2021Publication date: March 7, 2024Applicant: Hewlett-Packard Development Company, L.P.Inventors: Christopher Howard Stewart, Richard Alden Bramley, Jr., James Misra McKenzie, Krzysztof Tadeusz Uchronski, Gianluca Guida, Christopher Ian Dalton, Jeffrey Kevin Jeansonne
-
Patent number: 11901918Abstract: Current Wireless transmission volume is such that techniques to compress transmitted data is the object of ongoing technical enhancements. The Invention consists of methods of using rapid changes in signal voltage to convey additional data which may be used for Data Compression, Encryption, and other purposes. They include varying amounts of change referred to as Encode Amplitude (EA) and Baseline Modulation (BM) using a change down to baseline voltage.Type: GrantFiled: November 19, 2021Date of Patent: February 13, 2024Inventor: James Howard Carmichael
-
Patent number: 11889763Abstract: An actuator may be integrated into an optical element such as a liquid lens and configured to create spherical curvature as well as a variable cylinder radius and axis in a surface of the optical element. An example actuator may include a stack of electromechanical layers, and electrodes configured to apply an electric field independently across each of the electromechanical layers. Within the stack, an orientation of neighboring electromechanical layers may differ, e.g., stepwise, by at least approximately 10°.Type: GrantFiled: February 23, 2021Date of Patent: January 30, 2024Assignee: Meta Platforms Technologies, LLCInventors: Andrew John Ouderkirk, Spencer Allan Wells, Christopher Stipe, Kenneth Alexander Diest, Christopher Yuan Ting Liao, Nagi Hosni Elabbasi, James Howard Thomas Ransley, Taha Masood, Liliana Ruiz Diaz, Laura Cressman
-
Patent number: 11888851Abstract: A server transmits to a third-party application a request for a resource that is received from a client. The server receives an authentication request from the client device that has been generated by the third-party application. The server transmits an identity provider selection page to the client device that allows the client device to select an identity provider. The server causes the client device to transmit a second authentication request to a selected identity provider. The server receives an authentication response that was generated by the identity provider that includes the identity of the user. The server enforces access rule(s) including identity-based rule(s) and/or non-identity based rule(s). If the user is permitted to access the third-party application, the server causes an authentication response to be transmitted from the client device to the third-party application that indicates the user has successfully authenticated.Type: GrantFiled: July 18, 2022Date of Patent: January 30, 2024Assignee: CLOUDFLARE, INC.Inventors: James Howard Royal, Samuel Douglas Rhea
-
Patent number: 11863436Abstract: A primary internet connection via a gateway or router located at a premises may be used to route internet traffic from devices located at the premises. A change in the primary internet connection, such as a loss or a degradation of the connection, may occur. Based on the change in the primary internet connection, metrics of alternative internet connections, such as cellular or hotspot connections, may be used to select one of the alternative internet connections. Internet traffic may be routed via the selected alternative internet connection until the primary internet connection is reestablished or improves.Type: GrantFiled: January 19, 2023Date of Patent: January 2, 2024Assignee: COMCAST CABLE COMMUNICATIONS, LLCInventor: James Howard Stephens, Jr.
-
Publication number: 20230409695Abstract: Systems and methods for determining authenticity of a security device of a component in an imaging device includes receiving, by the security device, an authentication challenge including one or more commands and executing, by the security device, the one or more commands in response to receiving the authentication challenge. A magnetic field profile is generated based on current drawn by the security device from a power source while the security device is executing the one or more commands, the generated magnetic field profile indicating an authentication response of the security device to the authentication challenge for use in determining authenticity of the security device.Type: ApplicationFiled: July 11, 2022Publication date: December 21, 2023Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER
-
Publication number: 20230412644Abstract: A cloud-based security service that includes external evaluation for accessing a third-party application. The security service receives a request to access a third-party application from a client device. The security service enforces a set of one or more access policies configured for the third-party application including an external evaluation rule. As part of enforcing the external evaluation rule, the security service transmits an external evaluation request to an external endpoint defined in the external evaluation rule. The external evaluation request includes an identity of a user associated with the request. The security service receives the result of the external evaluation. If the external evaluation passed, the security service grants access to the third-party application based at least in part on its passing.Type: ApplicationFiled: September 29, 2022Publication date: December 21, 2023Inventor: James Howard Royal
-
Publication number: 20230409690Abstract: A method for determining authenticity of a security device of a component in an imaging device includes receiving, by the security device, an authentication challenge including one or more commands and executing, by the security device, the one or more commands in response to receiving the authentication challenge. A magnetic field profile is generated based on current drawn by the security device from a power source while the security device is executing the one or more commands, the generated magnetic field profile indicating an authentication response of the security device to the authentication challenge for use in determining authenticity of the security device.Type: ApplicationFiled: June 22, 2022Publication date: December 21, 2023Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER
-
Patent number: D1018974Type: GrantFiled: September 1, 2021Date of Patent: March 19, 2024Assignee: Dyson Technology LimitedInventors: Edward Sebert Maurice Shelton, Ng Eric Purnama Utama, Graeme McPherson, Ivym Uriarte Susana, Jonathan James Harvey Heffer, Laura Anne Howard, Simon Brian McNamee