Patents by Inventor James Sharp
James Sharp has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12244633Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: GrantFiled: March 12, 2024Date of Patent: March 4, 2025Assignee: UPGUARD, INC.Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Publication number: 20240294918Abstract: Nucleic acid molecules and compositions thereof targeted to fidgetin-like 2, and methods of their use in treating a wound or scar in a human subject are described.Type: ApplicationFiled: February 27, 2021Publication date: September 5, 2024Applicant: MICROCURES, INC.Inventors: Douglas G. BROOKS, Brian O'ROURKE, Adam KRAMER, David James SHARP
-
Publication number: 20240273228Abstract: A breach detection engine detects and mitigates the effects of breaches across one or more data sources. An index is generated based on one or more data sources and the index is queried using keywords indicative of potential breaches. A database of potential breaches is populated based on the query of the index. The potential breach database is queried using keywords associated with a system identity (e.g., a third party). A likelihood of a candidate breach is identified based on a set of breach criteria weights. A network node associated with a candidate breach determined to be an actual breach is identified for isolation or for the performance of one or more additional security actions.Type: ApplicationFiled: April 20, 2024Publication date: August 15, 2024Inventors: Alan James Sharp-Paul, Christopher Robert Vickery, Jonathan David Hendren, Gregory Ford Pollock, Daniel Bradbury, Christian Alan Kiely, Gavin Richard Turner, Michael Franz Baukes
-
Publication number: 20240267291Abstract: An operator node is configured to enable the management of nodes communicatively coupled to the operator node via a network. A selection of node objects is received by the operator node, the selected node objects including software components for inclusion within a node configuration. A configuration policy is generated based on the selected objects, the configuration policy including a set of tests (such as scripts or executables) that, when run, test for the presence of one or more of the selected node objects. A target node is scanned to determine the configuration of the target node, and the set of tests are applied to identify a set of objects identified by the policy but not installed at the target node. The target node is then re-configured to install the identified set of objects at the target node.Type: ApplicationFiled: April 17, 2024Publication date: August 8, 2024Inventors: Alan James Sharp-Paul, Michael Franz Baukes
-
Publication number: 20240223593Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: ApplicationFiled: March 12, 2024Publication date: July 4, 2024Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Patent number: 11995206Abstract: A breach detection engine detects and mitigates the effects of breaches across one or more data sources. An index is generated based on one or more data sources and the index is queried using keywords indicative of potential breaches. A database of potential breaches is populated based on the query of the index. The potential breach database is queried using keywords associated with a system identity (e.g., a third party). A likelihood of a candidate breach is identified based on a set of breach criteria weights. A network node associated with a candidate breach determined to be an actual breach is identified for isolation or for the performance of one or more additional security actions.Type: GrantFiled: March 7, 2023Date of Patent: May 28, 2024Assignee: UPGUARD, INC.Inventors: Alan James Sharp-Paul, Christopher Robert Vickery, Jonathan David Hendren, Gregory Ford Pollock, Daniel Bradbury, Christian Alan Kiely, Gavin Richard Turner, Michael Franz Baukes
-
Patent number: 11991043Abstract: An operator node is configured to enable the management of nodes communicatively coupled to the operator node via a network. A selection of node objects is received by the operator node, the selected node objects including software components for inclusion within a node configuration. A configuration policy is generated based on the selected objects, the configuration policy including a set of tests (such as scripts or executables) that, when run, test for the presence of one or more of the selected node objects. A target node is scanned to determine the configuration of the target node, and the set of tests are applied to identify a set of objects identified by the policy but not installed at the target node. The target node is then re-configured to install the identified set of objects at the target node.Type: GrantFiled: September 22, 2022Date of Patent: May 21, 2024Assignee: UPGUARD, INC.Inventors: Alan James Sharp-Paul, Michael Franz Baukes
-
Patent number: 11962613Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: GrantFiled: June 28, 2023Date of Patent: April 16, 2024Assignee: UPGUARD, INC.Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Publication number: 20240091455Abstract: An administration device for intravitreal administration of a fluid wherein a second actuation part of the administration device is configured to axially block a plunger rod and/or a first actuation part of the administration device, where in the second actuation part is to be actuated in order to axially release the plunger rod and/or the first actuation part such that the first actuation part can be actuated. The administration device has a securing member that is configured to block a back-movement of the plunger rod and/or the first actuation part at least in an initial position and/or in an administration position of the plunger rod and wherein the securing member is configured to block actuation of the second actuation part before reaching the administration position of the plunger rod.Type: ApplicationFiled: November 30, 2021Publication date: March 21, 2024Inventors: Axel ROTH, Ralph Donald Quentin COLLINGS, Andrew Guy LABAT-ROCHECOUSTE, Nicholas James SHARP, Steffen SCHUY
-
Publication number: 20240006903Abstract: A mobile solar power unit control system providing power to an associated equipment item comprising: at least one mobile solar power unit comprising an assembly of inter-connected solar collector panels; an energy storage module connected to receive power from the assembly of inter-connected solar panels; and a control system for controlling operation of both the energy storage module and associated equipment item. The control system comprises a local controller onboard or proximate the at least one mobile solar power unit and a remote controller, communicable with the local controller, located remotely from said at least one mobile solar power unit. The mobile solar power unit conveniently provides power for an associated equipment item and any selected auxiliary loads located in an off-grid location.Type: ApplicationFiled: October 27, 2021Publication date: January 4, 2024Inventor: David James SHARP
-
Publication number: 20230336583Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: ApplicationFiled: June 28, 2023Publication date: October 19, 2023Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Publication number: 20230308041Abstract: A mobile solar panel unit (10) comprising: (a) a transport device (10) having a load zone (20) having a cross sectional area; and (b) an assembly (30) of a plurality of inter-connected solar collector panels (40, 42, 44) for providing, in use, power to an associated equipment item (70); wherein adjacent panels (40, 42; 42, 44) in said assembly (30) of solar collector panels (40, 42, 44) are inter-connected by rotatable connection means (50, 50a) for rotating panels (40, 44) allowing both storage of said assembly (30) of inter-connected solar collector panels (40, 42; 42, 44) in said load zone (20) and deployment of said assembly (30) of inter-connected solar collector panels (40, 42, 44) to a collection position to generate power when exposed to sunlight.Type: ApplicationFiled: December 15, 2020Publication date: September 28, 2023Inventor: David James Sharp
-
Patent number: 11729205Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: GrantFiled: December 22, 2022Date of Patent: August 15, 2023Assignee: UPGUARD, INC.Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Publication number: 20230205911Abstract: A breach detection engine detects and mitigates the effects of breaches across one or more data sources. An index is generated based on one or more data sources and the index is queried using keywords indicative of potential breaches. A database of potential breaches is populated based on the query of the index. The potential breach database is queried using keywords associated with a system identity (e.g., a third party). A likelihood of a candidate breach is identified based on a set of breach criteria weights. A network node associated with a candidate breach determined to be an actual breach is identified for isolation or for the performance of one or more additional security actions.Type: ApplicationFiled: March 7, 2023Publication date: June 29, 2023Inventors: Alan James Sharp-Paul, Christopher Robert Vickery, Jonathan David Hendren, Gregory Ford Pollock, Daniel Bradbury, Christian Alan Kiely, Gavin Richard Turner, Michael Franz Baukes
-
Publication number: 20230203495Abstract: Methods of accelerating or improving the healing of a skin graft or skin grafting site in a subject are provided comprising administering to the subject an amount of an inhibitor of fidgetin-like 2.Type: ApplicationFiled: February 26, 2021Publication date: June 29, 2023Applicant: MICROCURES, INC.Inventors: David James SHARP, Brian O'ROURKE
-
Publication number: 20230127628Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: ApplicationFiled: December 22, 2022Publication date: April 27, 2023Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Patent number: 11630911Abstract: A breach detection engine detects and mitigates the effects of breaches across one or more data sources. An index is generated based on one or more data sources and the index is queried using keywords indicative of potential breaches. A database of potential breaches is populated based on the query of the index. The potential breach database is queried using keywords associated with a system identity (e.g., a third party). A likelihood of a candidate breach is identified based on a set of breach criteria weights. A network node associated with a candidate breach determined to be an actual breach is identified for isolation or for the performance of one or more additional security actions.Type: GrantFiled: April 15, 2021Date of Patent: April 18, 2023Assignee: UPGUARD, INC.Inventors: Alan James Sharp-Paul, Christopher Robert Vickery, Jonathan David Hendren, Gregory Ford Pollock, Daniel Bradbury, Christian Alan Kiely, Gavin Richard Turner, Michael Franz Baukes
-
Patent number: 11575701Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: GrantFiled: June 21, 2021Date of Patent: February 7, 2023Assignee: Upguard, Inc.Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Publication number: 20230020098Abstract: An operator node is configured to enable the management of nodes communicatively coupled to the operator node via a network. A selection of node objects is received by the operator node, the selected node objects including software components for inclusion within a node configuration. A configuration policy is generated based on the selected objects, the configuration policy including a set of tests (such as scripts or executables) that, when run, test for the presence of one or more of the selected node objects. A target node is scanned to determine the configuration of the target node, and the set of tests are applied to identify a set of objects identified by the policy but not installed at the target node. The target node is then re-configured to install the identified set of objects at the target node.Type: ApplicationFiled: September 22, 2022Publication date: January 19, 2023Inventors: Alan James Sharp-Paul, Michael Franz Baukes
-
Patent number: 11489722Abstract: An operator node is configured to enable the management of nodes communicatively coupled to the operator node via a network. A selection of node objects is received by the operator node, the selected node objects including software components for inclusion within a node configuration. A configuration policy is generated based on the selected objects, the configuration policy including a set of tests (such as scripts or executables) that, when run, test for the presence of one or more of the selected node objects. A target node is scanned to determine the configuration of the target node, and the set of tests are applied to identify a set of objects identified by the policy but not installed at the target node. The target node is then re-configured to install the identified set of objects at the target node.Type: GrantFiled: December 23, 2020Date of Patent: November 1, 2022Assignee: Upguard, Inc.Inventors: Alan James Sharp-Paul, Michael Franz Baukes