Patents by Inventor James Sharp
James Sharp has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210353824Abstract: Methods and compositions for reducing a ratio of collagen III to collagen I in wounded skin, treating wounds and accelerating healing is provided with a surfactant polymer dressing comprising FL2 siRNA, collagen and a poloxamer.Type: ApplicationFiled: October 23, 2019Publication date: November 18, 2021Applicants: ALBERT EINSTEIN COLLEGE OF MEDICINE, MICROCURE, INC.Inventors: David James SHARP, Brian O'ROURKE, Adam Hildyard KRAMER
-
Publication number: 20210314344Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: ApplicationFiled: June 21, 2021Publication date: October 7, 2021Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Publication number: 20210232699Abstract: A breach detection engine detects and mitigates the effects of breaches across one or more data sources. An index is generated based on one or more data sources and the index is queried using keywords indicative of potential breaches. A database of potential breaches is populated based on the query of the index. The potential breach database is queried using keywords associated with a system identity (e.g., a third party). A likelihood of a candidate breach is identified based on a set of breach criteria weights. A network node associated with a candidate breach determined to be an actual breach is identified for isolation or for the performance of one or more additional security actions.Type: ApplicationFiled: April 15, 2021Publication date: July 29, 2021Inventors: Alan James Sharp-Paul, Christopher Robert Vickery, Jonathan David Hendren, Gregory Ford Pollock, Daniel Bradbury, Christian Alan Kiely, Gavin Richard Turner, Michael Franz Baukes
-
Patent number: 11075940Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: GrantFiled: August 14, 2019Date of Patent: July 27, 2021Assignee: Upguard, Inc.Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Publication number: 20210171957Abstract: Methods are described for enhancing the tumor homing or penetration activity of T-cells to improve cancer treatment, by exposing T-cells in vitro, ex vivo or in vivo to an agent that inhibits fidgetin-like 2 activity, such as by using an RNA interference agent.Type: ApplicationFiled: October 23, 2020Publication date: June 10, 2021Applicant: MICROCURES, INC.Inventors: Abhinav DEY, David James Sharp
-
Patent number: 11023610Abstract: A breach detection engine detects and mitigates the effects of breaches across one or more data sources. An index is generated based on one or more data sources and the index is queried using keywords indicative of potential breaches. A database of potential breaches is populated based on the query of the index. The potential breach database is queried using keywords associated with a system identity (e.g., a third party). A likelihood of a candidate breach is identified based on a set of breach criteria weights. A network node associated with a candidate breach determined to be an actual breach is identified for isolation or for the performance of one or more additional security actions.Type: GrantFiled: January 23, 2019Date of Patent: June 1, 2021Assignee: UPGUARD, INC.Inventors: Alan James Sharp-Paul, Christopher Robert Vickery, Jonathan David Hendren, Gregory Ford Pollock, Daniel Bradbury, Christian Alan Kiely, Gavin Richard Turner, Michael Franz Baukes
-
Publication number: 20210119868Abstract: An operator node is configured to enable the management of nodes communicatively coupled to the operator node via a network. A selection of node objects is received by the operator node, the selected node objects including software components for inclusion within a node configuration. A configuration policy is generated based on the selected objects, the configuration policy including a set of tests (such as scripts or executables) that, when run, test for the presence of one or more of the selected node objects. A target node is scanned to determine the configuration of the target node, and the set of tests are applied to identify a set of objects identified by the policy but not installed at the target node. The target node is then re-configured to install the identified set of objects at the target node.Type: ApplicationFiled: December 23, 2020Publication date: April 22, 2021Inventors: Alan James Sharp-Paul, Michael Franz Baukes
-
Patent number: 10911302Abstract: An operator node is configured to enable the management of nodes communicatively coupled to the operator node via a network. A selection of node objects is received by the operator node, the selected node objects including software components for inclusion within a node configuration. A configuration policy is generated based on the selected objects, the configuration policy including a set of tests (such as scripts or executables) that, when run, test for the presence of one or more of the selected node objects. A target node is scanned to determine the configuration of the target node, and the set of tests are applied to identify a set of objects identified by the policy but not installed at the target node. The target node is then re-configured to install the identified set of objects at the target node.Type: GrantFiled: August 14, 2019Date of Patent: February 2, 2021Assignee: Upguard, Inc.Inventors: Alan James Sharp-Paul, Michael Franz Baukes
-
Publication number: 20200233971Abstract: A breach detection engine detects and mitigates the effects of breaches across one or more data sources. An index is generated based on one or more data sources and the index is queried using keywords indicative of potential breaches. A database of potential breaches is populated based on the query of the index. The potential breach database is queried using keywords associated with a system identity (e.g., a third party). A likelihood of a candidate breach is identified based on a set of breach criteria weights. A network node associated with a candidate breach determined to be an actual breach is identified for isolation or for the performance of one or more additional security actions.Type: ApplicationFiled: January 23, 2019Publication date: July 23, 2020Inventors: Alan James Sharp-Paul, Christopher Robert Vickery, Jonathan David Hendren, Gregory Ford Pollock, Daniel Bradbury, Christian Alan Kiely, Gavin Richard Turner, Michael Franz Baukes
-
Publication number: 20190372842Abstract: An operator node is configured to enable the management of nodes communicatively coupled to the operator node via a network. A selection of node objects is received by the operator node, the selected node objects including software components for inclusion within a node configuration. A configuration policy is generated based on the selected objects, the configuration policy including a set of tests (such as scripts or executables) that, when run, test for the presence of one or more of the selected node objects. A target node is scanned to determine the configuration of the target node, and the set of tests are applied to identify a set of objects identified by the policy but not installed at the target node. The target node is then re-configured to install the identified set of objects at the target node.Type: ApplicationFiled: August 14, 2019Publication date: December 5, 2019Inventors: Alan James Sharp-Paul, Michael Franz Baukes
-
Publication number: 20190373009Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: ApplicationFiled: August 14, 2019Publication date: December 5, 2019Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Patent number: 10440045Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: GrantFiled: October 2, 2018Date of Patent: October 8, 2019Assignee: Upguard, Inc.Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Patent number: 10425278Abstract: An operator node is configured to enable the management of nodes communicatively coupled to the operator node via a network. A selection of node objects is received by the operator node, the selected node objects including software components for inclusion within a node configuration. A configuration policy is generated based on the selected objects, the configuration policy including a set of tests (such as scripts or executables) that, when run, test for the presence of one or more of the selected node objects. A target node is scanned to determine the configuration of the target node, and the set of tests are applied to identify a set of objects identified by the policy but not installed at the target node. The target node is then re-configured to install the identified set of objects at the target node.Type: GrantFiled: October 3, 2017Date of Patent: September 24, 2019Assignee: Upguard, Inc.Inventors: Alan James Sharp-Paul, Michael Franz Baukes
-
Publication number: 20190044970Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: ApplicationFiled: October 2, 2018Publication date: February 7, 2019Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Patent number: 10142364Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: GrantFiled: September 21, 2016Date of Patent: November 27, 2018Assignee: Upguard, Inc.Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Patent number: 10079724Abstract: Computer nodes in a network manage the configuration of neighbor nodes and enforce policy compliance by scanning neighboring nodes and taking corrective action based on consensus. A testing node scans a neighboring target node and identifies if the target node violates the policy. The testing node requests common neighbors of the target node to repeat the scan. If the common neighbors agree that the target node violates the policy, a corrective action is taken to ensure compliance with the policy. Corrective action includes reconfiguration of the target node. Nodes also perform negative checking to ensure adherence to separation rules restricting interaction between neighboring nodes. A testing node attempts to perform a restricted action with a neighboring restricted node. If the restricted action is successful, the testing node takes corrective action on the target node to ensure that subsequent attempts to perform the restriction action are denied access in compliance with the policy.Type: GrantFiled: February 20, 2016Date of Patent: September 18, 2018Assignee: Upguard, Inc.Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Publication number: 20180084000Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: ApplicationFiled: September 21, 2016Publication date: March 22, 2018Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Publication number: 20180026843Abstract: An operator node is configured to enable the management of nodes communicatively coupled to the operator node via a network. A selection of node objects is received by the operator node, the selected node objects including software components for inclusion within a node configuration. A configuration policy is generated based on the selected objects, the configuration policy including a set of tests (such as scripts or executables) that, when run, test for the presence of one or more of the selected node objects. A target node is scanned to determine the configuration of the target node, and the set of tests are applied to identify a set of objects identified by the policy but not installed at the target node. The target node is then re-configured to install the identified set of objects at the target node.Type: ApplicationFiled: October 3, 2017Publication date: January 25, 2018Inventors: Alan James Sharp-Paul, Michael Franz Baukes
-
Patent number: 9813292Abstract: An operator node is configured to enable the management of nodes communicatively coupled to the operator node via a network. A selection of node objects is received by the operator node, the selected node objects including software components for inclusion within a node configuration. A configuration policy is generated based on the selected objects, the configuration policy including a set of tests (such as scripts or executables) that, when run, test for the presence of one or more of the selected node objects. A target node is scanned to determine the configuration of the target node, and the set of tests are applied to identify a set of objects identified by the policy but not installed at the target node. The target node is then re-configured to install the identified set of objects at the target node.Type: GrantFiled: December 17, 2014Date of Patent: November 7, 2017Assignee: Upguard, Inc.Inventors: Alan James Sharp-Paul, Michael Franz Baukes
-
Publication number: 20170244761Abstract: Computer nodes in a network manage the configuration of neighbor nodes and enforce policy compliance by scanning neighboring nodes and taking corrective action based on consensus. A testing node scans a neighboring target node and identifies if the target node violates the policy. The testing node requests common neighbors of the target node to repeat the scan. If the common neighbors agree that the target node violates the policy, a corrective action is taken to ensure compliance with the policy. Corrective action includes reconfiguration of the target node. Nodes also perform negative checking to ensure adherence to separation rules restricting interaction between neighboring nodes. A testing node attempts to perform a restricted action with a neighboring restricted node. If the restricted action is successful, the testing node takes corrective action on the target node to ensure that subsequent attempts to perform the restriction action are denied access in compliance with the policy.Type: ApplicationFiled: February 20, 2016Publication date: August 24, 2017Inventors: Michael Franz Baukes, Alan James Sharp-Paul