Patents by Inventor James A. Howard

James A. Howard has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12002161
    Abstract: Methods and apparatus for a map tool displaying a three-dimensional view of a map based on a three-dimensional model of the surrounding environment. The three-dimensional map view of a map may be based on a model constructed from multiple data sets, where the multiple data sets include mapping information for an overlapping area of the map displayed in the map view. For example, one data set may include two-dimensional data including object footprints, where the object footprints may be extruded into a three-dimensional object based on data from a data set composed of three-dimensional data. In this example, the three-dimensional data may include height information that corresponds to the two-dimensional object, where the height may be obtained by correlating the location of the two-dimensional object within the three-dimensional data.
    Type: Grant
    Filed: December 21, 2018
    Date of Patent: June 4, 2024
    Assignee: Apple Inc.
    Inventors: James A. Howard, Christopher Blumenberg
  • Publication number: 20240171576
    Abstract: A server transmits to a third-party application a request for a resource that is received from a client. The server receives an authentication request from the client device that has been generated by the third-party application. The server transmits an identity provider selection page to the client device that allows the client device to select an identity provider. The server causes the client device to transmit a second authentication request to a selected identity provider. The server receives an authentication response that was generated by the identity provider that includes the identity of the user. The server enforces access rule(s) including identity-based rule(s) and/or non-identity based rule(s). If the user is permitted to access the third-party application, the server causes an authentication response to be transmitted from the client device to the third-party application that indicates the user has successfully authenticated.
    Type: Application
    Filed: January 29, 2024
    Publication date: May 23, 2024
    Inventors: James Howard Royal, Samuel Douglas Rhea
  • Publication number: 20240143726
    Abstract: An imaging device comprising a controller, a prover supply item and a verifier supply item, where the imaging device is configured to authenticate the prover supply item by: sending a challenge response from the prover supply item to the verifier supply item, and determining a status of the challenge response. When the verifier supply item determines that the received challenge response is a correct output of an algorithm when challenge data is input to the algorithm, the status is determined as verified. A supply item configured to be operable as a prover supply item when installed in an imaging device. The prover supply item is configured to receive an indication of an algorithm to be performed and receive challenge data, perform the algorithm using the challenge data as input to determine a challenge response, and send the challenge response to a verifier supply item.
    Type: Application
    Filed: January 27, 2023
    Publication date: May 2, 2024
    Inventors: Samuel Davidson, James Howard Ellis, Zachary Nathan Fister, Timothy John Rademacher, Jennifer Topmiller Williams
  • Publication number: 20240143725
    Abstract: A method of determining trust in a supply item in an imaging device for verifying other supply items installed in the imaging device via an algorithm, wherein the imaging device has a plurality of installed supply items. The method comprises: sending challenge data and an indication of the algorithm to a candidate supply item, receiving a challenge response from the candidate supply item, and determining, by the controller, a status of the challenge response, the status being verified or unverified. When the controller determines that the received challenge response is a correct output of the algorithm when the challenge data is input to the algorithm, the status is determined as verified. Further, an imaging device configured to determine trust in a supply item installed in the imaging device for verifying other supply items installed in the imaging device via an algorithm.
    Type: Application
    Filed: January 27, 2023
    Publication date: May 2, 2024
    Inventors: Samuel Davidson, James Howard Ellis, Zachary Nathan Fister, Timothy John Rademacher, Jennifer Topmiller Williams
  • Publication number: 20240143844
    Abstract: A method of authenticating a supply item in an imaging device, wherein the supply item is designated as a prover supply item, and a second supply item installed in the imaging device is designated as a verifier supply item. The method comprises: receiving a challenge response from the prover supply item and determining a status of the challenge response. When the verifier supply item determines that the received challenge response is a correct output of an algorithm when challenge data is input to the algorithm, the status is determined as verified. The verifier supply item is disclosed, configured to receive a challenge response from a prover supply item installed in the imaging device, and determine a status of the challenge response. When the verifier supply item determines that the received challenge response is a correct output of an algorithm, the status is determined as verified.
    Type: Application
    Filed: January 27, 2023
    Publication date: May 2, 2024
    Inventors: Samuel Davidson, James Howard Ellis, Zachary Nathan Fister, Timothy John Rademacher, Jennifer Topmiller Williams
  • Publication number: 20240106864
    Abstract: A cloud-based security service that includes external evaluation for accessing a third-party application. The security service receives a request to access a third-party application from a client device. The security service enforces a set of one or more access policies configured for the third-party application including an external evaluation rule. As part of enforcing the external evaluation rule, the security service transmits an external evaluation request to an external endpoint defined in the external evaluation rule. The external evaluation request includes an identity of a user associated with the request. The security service receives the result of the external evaluation. If the external evaluation passed, the security service grants access to the third-party application based at least in part on its passing.
    Type: Application
    Filed: December 4, 2023
    Publication date: March 28, 2024
    Inventor: James Howard Royal
  • Publication number: 20240089199
    Abstract: A primary internet connection via a gateway or router located at a premises may be used to route internet traffic from devices located at the premises. A change in the primary internet connection, such as a loss or a degradation of the connection, may occur. Based on the change in the primary internet connection, metrics of alternative internet connections, such as cellular or hotspot connections, may be used to select one of the alternative internet connections. Internet traffic may be routed via the selected alternative internet connection until the primary internet connection is reestablished or improves.
    Type: Application
    Filed: November 17, 2023
    Publication date: March 14, 2024
    Inventor: James Howard STEPHENS, JR.
  • Patent number: 11901918
    Abstract: Current Wireless transmission volume is such that techniques to compress transmitted data is the object of ongoing technical enhancements. The Invention consists of methods of using rapid changes in signal voltage to convey additional data which may be used for Data Compression, Encryption, and other purposes. They include varying amounts of change referred to as Encode Amplitude (EA) and Baseline Modulation (BM) using a change down to baseline voltage.
    Type: Grant
    Filed: November 19, 2021
    Date of Patent: February 13, 2024
    Inventor: James Howard Carmichael
  • Patent number: 11889763
    Abstract: An actuator may be integrated into an optical element such as a liquid lens and configured to create spherical curvature as well as a variable cylinder radius and axis in a surface of the optical element. An example actuator may include a stack of electromechanical layers, and electrodes configured to apply an electric field independently across each of the electromechanical layers. Within the stack, an orientation of neighboring electromechanical layers may differ, e.g., stepwise, by at least approximately 10°.
    Type: Grant
    Filed: February 23, 2021
    Date of Patent: January 30, 2024
    Assignee: Meta Platforms Technologies, LLC
    Inventors: Andrew John Ouderkirk, Spencer Allan Wells, Christopher Stipe, Kenneth Alexander Diest, Christopher Yuan Ting Liao, Nagi Hosni Elabbasi, James Howard Thomas Ransley, Taha Masood, Liliana Ruiz Diaz, Laura Cressman
  • Patent number: 11888851
    Abstract: A server transmits to a third-party application a request for a resource that is received from a client. The server receives an authentication request from the client device that has been generated by the third-party application. The server transmits an identity provider selection page to the client device that allows the client device to select an identity provider. The server causes the client device to transmit a second authentication request to a selected identity provider. The server receives an authentication response that was generated by the identity provider that includes the identity of the user. The server enforces access rule(s) including identity-based rule(s) and/or non-identity based rule(s). If the user is permitted to access the third-party application, the server causes an authentication response to be transmitted from the client device to the third-party application that indicates the user has successfully authenticated.
    Type: Grant
    Filed: July 18, 2022
    Date of Patent: January 30, 2024
    Assignee: CLOUDFLARE, INC.
    Inventors: James Howard Royal, Samuel Douglas Rhea
  • Patent number: 11863436
    Abstract: A primary internet connection via a gateway or router located at a premises may be used to route internet traffic from devices located at the premises. A change in the primary internet connection, such as a loss or a degradation of the connection, may occur. Based on the change in the primary internet connection, metrics of alternative internet connections, such as cellular or hotspot connections, may be used to select one of the alternative internet connections. Internet traffic may be routed via the selected alternative internet connection until the primary internet connection is reestablished or improves.
    Type: Grant
    Filed: January 19, 2023
    Date of Patent: January 2, 2024
    Assignee: COMCAST CABLE COMMUNICATIONS, LLC
    Inventor: James Howard Stephens, Jr.
  • Publication number: 20230412644
    Abstract: A cloud-based security service that includes external evaluation for accessing a third-party application. The security service receives a request to access a third-party application from a client device. The security service enforces a set of one or more access policies configured for the third-party application including an external evaluation rule. As part of enforcing the external evaluation rule, the security service transmits an external evaluation request to an external endpoint defined in the external evaluation rule. The external evaluation request includes an identity of a user associated with the request. The security service receives the result of the external evaluation. If the external evaluation passed, the security service grants access to the third-party application based at least in part on its passing.
    Type: Application
    Filed: September 29, 2022
    Publication date: December 21, 2023
    Inventor: James Howard Royal
  • Publication number: 20230409696
    Abstract: Systems and methods for determining authenticity of a security device of a component in an imaging device includes receiving, by the security device, an authentication challenge including one or more commands and executing, by the security device, the one or more commands in response to receiving the authentication challenge. A magnetic field profile is generated based on current drawn by the security device from a power source while the security device is executing the one or more commands, the generated magnetic field profile indicating an authentication response of the security device to the authentication challenge for use in determining authenticity of the security device.
    Type: Application
    Filed: July 13, 2022
    Publication date: December 21, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER
  • Publication number: 20230409695
    Abstract: Systems and methods for determining authenticity of a security device of a component in an imaging device includes receiving, by the security device, an authentication challenge including one or more commands and executing, by the security device, the one or more commands in response to receiving the authentication challenge. A magnetic field profile is generated based on current drawn by the security device from a power source while the security device is executing the one or more commands, the generated magnetic field profile indicating an authentication response of the security device to the authentication challenge for use in determining authenticity of the security device.
    Type: Application
    Filed: July 11, 2022
    Publication date: December 21, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER
  • Publication number: 20230409697
    Abstract: Systems and methods for determining authenticity of a security device of a component in an imaging device includes receiving, by the security device, an authentication challenge including one or more commands and executing, by the security device, the one or more commands in response to receiving the authentication challenge. A magnetic field profile is generated based on current drawn by the security device from a power source while the security device is executing the one or more commands, the generated magnetic field profile indicating an authentication response of the security device to the authentication challenge for use in determining authenticity of the security device.
    Type: Application
    Filed: July 18, 2022
    Publication date: December 21, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER
  • Publication number: 20230409690
    Abstract: A method for determining authenticity of a security device of a component in an imaging device includes receiving, by the security device, an authentication challenge including one or more commands and executing, by the security device, the one or more commands in response to receiving the authentication challenge. A magnetic field profile is generated based on current drawn by the security device from a power source while the security device is executing the one or more commands, the generated magnetic field profile indicating an authentication response of the security device to the authentication challenge for use in determining authenticity of the security device.
    Type: Application
    Filed: June 22, 2022
    Publication date: December 21, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER
  • Patent number: 11838327
    Abstract: A cloud-based security service that includes external evaluation for accessing a third-party application. The security service receives a request to access a third-party application from a client device. The security service enforces a set of one or more access policies configured for the third-party application including an external evaluation rule. As part of enforcing the external evaluation rule, the security service transmits an external evaluation request to an external endpoint defined in the external evaluation rule. The external evaluation request includes an identity of a user associated with the request. The security service receives the result of the external evaluation. If the external evaluation passed, the security service grants access to the third-party application based at least in part on its passing.
    Type: Grant
    Filed: September 29, 2022
    Date of Patent: December 5, 2023
    Assignee: CLOUDFLARE, INC.
    Inventor: James Howard Royal
  • Publication number: 20230367865
    Abstract: Determining authenticity of a component in an imaging device includes generating an analog signal as an authentication challenge to the component. The component then generates a response to the authentication challenge by converting the analog signal into one or more digital values and capturing a derivative of the one or more digital values as the response. Authenticity of the component is determined by comparing the response with an expected response.
    Type: Application
    Filed: June 29, 2022
    Publication date: November 16, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER, JENNIFER TOPMILLER WILLIAMS
  • Publication number: 20230367863
    Abstract: A method of determining authenticity of a component in an imaging device includes generating an analog signal as an authentication challenge to the component. The method further includes generating, by the component, a response to the authentication challenge by converting the analog signal into one or more digital values and capturing a derivative of the one or more digital values as the response. Authenticity of the component is determined by comparing the response with an expected response.
    Type: Application
    Filed: June 23, 2022
    Publication date: November 16, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER, JENNIFER TOPMILLER WILLIAMS
  • Publication number: 20230367866
    Abstract: Determining authenticity of a component in an imaging device includes generating an analog signal as an authentication challenge to the component. The component then generates a response to the authentication challenge by converting the analog signal into one or more digital values and capturing a derivative of the one or more digital values as the response. Authenticity of the component is determined by comparing the response with an expected response.
    Type: Application
    Filed: July 18, 2022
    Publication date: November 16, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER, JENNIFER TOPMILLER WILLIAMS