Patents by Inventor James Sharp

James Sharp has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210353824
    Abstract: Methods and compositions for reducing a ratio of collagen III to collagen I in wounded skin, treating wounds and accelerating healing is provided with a surfactant polymer dressing comprising FL2 siRNA, collagen and a poloxamer.
    Type: Application
    Filed: October 23, 2019
    Publication date: November 18, 2021
    Applicants: ALBERT EINSTEIN COLLEGE OF MEDICINE, MICROCURE, INC.
    Inventors: David James SHARP, Brian O'ROURKE, Adam Hildyard KRAMER
  • Publication number: 20210314344
    Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.
    Type: Application
    Filed: June 21, 2021
    Publication date: October 7, 2021
    Inventors: Michael Franz Baukes, Alan James Sharp-Paul
  • Publication number: 20210232699
    Abstract: A breach detection engine detects and mitigates the effects of breaches across one or more data sources. An index is generated based on one or more data sources and the index is queried using keywords indicative of potential breaches. A database of potential breaches is populated based on the query of the index. The potential breach database is queried using keywords associated with a system identity (e.g., a third party). A likelihood of a candidate breach is identified based on a set of breach criteria weights. A network node associated with a candidate breach determined to be an actual breach is identified for isolation or for the performance of one or more additional security actions.
    Type: Application
    Filed: April 15, 2021
    Publication date: July 29, 2021
    Inventors: Alan James Sharp-Paul, Christopher Robert Vickery, Jonathan David Hendren, Gregory Ford Pollock, Daniel Bradbury, Christian Alan Kiely, Gavin Richard Turner, Michael Franz Baukes
  • Patent number: 11075940
    Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.
    Type: Grant
    Filed: August 14, 2019
    Date of Patent: July 27, 2021
    Assignee: Upguard, Inc.
    Inventors: Michael Franz Baukes, Alan James Sharp-Paul
  • Publication number: 20210171957
    Abstract: Methods are described for enhancing the tumor homing or penetration activity of T-cells to improve cancer treatment, by exposing T-cells in vitro, ex vivo or in vivo to an agent that inhibits fidgetin-like 2 activity, such as by using an RNA interference agent.
    Type: Application
    Filed: October 23, 2020
    Publication date: June 10, 2021
    Applicant: MICROCURES, INC.
    Inventors: Abhinav DEY, David James Sharp
  • Patent number: 11023610
    Abstract: A breach detection engine detects and mitigates the effects of breaches across one or more data sources. An index is generated based on one or more data sources and the index is queried using keywords indicative of potential breaches. A database of potential breaches is populated based on the query of the index. The potential breach database is queried using keywords associated with a system identity (e.g., a third party). A likelihood of a candidate breach is identified based on a set of breach criteria weights. A network node associated with a candidate breach determined to be an actual breach is identified for isolation or for the performance of one or more additional security actions.
    Type: Grant
    Filed: January 23, 2019
    Date of Patent: June 1, 2021
    Assignee: UPGUARD, INC.
    Inventors: Alan James Sharp-Paul, Christopher Robert Vickery, Jonathan David Hendren, Gregory Ford Pollock, Daniel Bradbury, Christian Alan Kiely, Gavin Richard Turner, Michael Franz Baukes
  • Publication number: 20210119868
    Abstract: An operator node is configured to enable the management of nodes communicatively coupled to the operator node via a network. A selection of node objects is received by the operator node, the selected node objects including software components for inclusion within a node configuration. A configuration policy is generated based on the selected objects, the configuration policy including a set of tests (such as scripts or executables) that, when run, test for the presence of one or more of the selected node objects. A target node is scanned to determine the configuration of the target node, and the set of tests are applied to identify a set of objects identified by the policy but not installed at the target node. The target node is then re-configured to install the identified set of objects at the target node.
    Type: Application
    Filed: December 23, 2020
    Publication date: April 22, 2021
    Inventors: Alan James Sharp-Paul, Michael Franz Baukes
  • Patent number: 10911302
    Abstract: An operator node is configured to enable the management of nodes communicatively coupled to the operator node via a network. A selection of node objects is received by the operator node, the selected node objects including software components for inclusion within a node configuration. A configuration policy is generated based on the selected objects, the configuration policy including a set of tests (such as scripts or executables) that, when run, test for the presence of one or more of the selected node objects. A target node is scanned to determine the configuration of the target node, and the set of tests are applied to identify a set of objects identified by the policy but not installed at the target node. The target node is then re-configured to install the identified set of objects at the target node.
    Type: Grant
    Filed: August 14, 2019
    Date of Patent: February 2, 2021
    Assignee: Upguard, Inc.
    Inventors: Alan James Sharp-Paul, Michael Franz Baukes
  • Publication number: 20200233971
    Abstract: A breach detection engine detects and mitigates the effects of breaches across one or more data sources. An index is generated based on one or more data sources and the index is queried using keywords indicative of potential breaches. A database of potential breaches is populated based on the query of the index. The potential breach database is queried using keywords associated with a system identity (e.g., a third party). A likelihood of a candidate breach is identified based on a set of breach criteria weights. A network node associated with a candidate breach determined to be an actual breach is identified for isolation or for the performance of one or more additional security actions.
    Type: Application
    Filed: January 23, 2019
    Publication date: July 23, 2020
    Inventors: Alan James Sharp-Paul, Christopher Robert Vickery, Jonathan David Hendren, Gregory Ford Pollock, Daniel Bradbury, Christian Alan Kiely, Gavin Richard Turner, Michael Franz Baukes
  • Publication number: 20190372842
    Abstract: An operator node is configured to enable the management of nodes communicatively coupled to the operator node via a network. A selection of node objects is received by the operator node, the selected node objects including software components for inclusion within a node configuration. A configuration policy is generated based on the selected objects, the configuration policy including a set of tests (such as scripts or executables) that, when run, test for the presence of one or more of the selected node objects. A target node is scanned to determine the configuration of the target node, and the set of tests are applied to identify a set of objects identified by the policy but not installed at the target node. The target node is then re-configured to install the identified set of objects at the target node.
    Type: Application
    Filed: August 14, 2019
    Publication date: December 5, 2019
    Inventors: Alan James Sharp-Paul, Michael Franz Baukes
  • Publication number: 20190373009
    Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.
    Type: Application
    Filed: August 14, 2019
    Publication date: December 5, 2019
    Inventors: Michael Franz Baukes, Alan James Sharp-Paul
  • Patent number: 10440045
    Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.
    Type: Grant
    Filed: October 2, 2018
    Date of Patent: October 8, 2019
    Assignee: Upguard, Inc.
    Inventors: Michael Franz Baukes, Alan James Sharp-Paul
  • Patent number: 10425278
    Abstract: An operator node is configured to enable the management of nodes communicatively coupled to the operator node via a network. A selection of node objects is received by the operator node, the selected node objects including software components for inclusion within a node configuration. A configuration policy is generated based on the selected objects, the configuration policy including a set of tests (such as scripts or executables) that, when run, test for the presence of one or more of the selected node objects. A target node is scanned to determine the configuration of the target node, and the set of tests are applied to identify a set of objects identified by the policy but not installed at the target node. The target node is then re-configured to install the identified set of objects at the target node.
    Type: Grant
    Filed: October 3, 2017
    Date of Patent: September 24, 2019
    Assignee: Upguard, Inc.
    Inventors: Alan James Sharp-Paul, Michael Franz Baukes
  • Publication number: 20190044970
    Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.
    Type: Application
    Filed: October 2, 2018
    Publication date: February 7, 2019
    Inventors: Michael Franz Baukes, Alan James Sharp-Paul
  • Patent number: 10142364
    Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.
    Type: Grant
    Filed: September 21, 2016
    Date of Patent: November 27, 2018
    Assignee: Upguard, Inc.
    Inventors: Michael Franz Baukes, Alan James Sharp-Paul
  • Patent number: 10079724
    Abstract: Computer nodes in a network manage the configuration of neighbor nodes and enforce policy compliance by scanning neighboring nodes and taking corrective action based on consensus. A testing node scans a neighboring target node and identifies if the target node violates the policy. The testing node requests common neighbors of the target node to repeat the scan. If the common neighbors agree that the target node violates the policy, a corrective action is taken to ensure compliance with the policy. Corrective action includes reconfiguration of the target node. Nodes also perform negative checking to ensure adherence to separation rules restricting interaction between neighboring nodes. A testing node attempts to perform a restricted action with a neighboring restricted node. If the restricted action is successful, the testing node takes corrective action on the target node to ensure that subsequent attempts to perform the restriction action are denied access in compliance with the policy.
    Type: Grant
    Filed: February 20, 2016
    Date of Patent: September 18, 2018
    Assignee: Upguard, Inc.
    Inventors: Michael Franz Baukes, Alan James Sharp-Paul
  • Publication number: 20180084000
    Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.
    Type: Application
    Filed: September 21, 2016
    Publication date: March 22, 2018
    Inventors: Michael Franz Baukes, Alan James Sharp-Paul
  • Publication number: 20180026843
    Abstract: An operator node is configured to enable the management of nodes communicatively coupled to the operator node via a network. A selection of node objects is received by the operator node, the selected node objects including software components for inclusion within a node configuration. A configuration policy is generated based on the selected objects, the configuration policy including a set of tests (such as scripts or executables) that, when run, test for the presence of one or more of the selected node objects. A target node is scanned to determine the configuration of the target node, and the set of tests are applied to identify a set of objects identified by the policy but not installed at the target node. The target node is then re-configured to install the identified set of objects at the target node.
    Type: Application
    Filed: October 3, 2017
    Publication date: January 25, 2018
    Inventors: Alan James Sharp-Paul, Michael Franz Baukes
  • Patent number: 9813292
    Abstract: An operator node is configured to enable the management of nodes communicatively coupled to the operator node via a network. A selection of node objects is received by the operator node, the selected node objects including software components for inclusion within a node configuration. A configuration policy is generated based on the selected objects, the configuration policy including a set of tests (such as scripts or executables) that, when run, test for the presence of one or more of the selected node objects. A target node is scanned to determine the configuration of the target node, and the set of tests are applied to identify a set of objects identified by the policy but not installed at the target node. The target node is then re-configured to install the identified set of objects at the target node.
    Type: Grant
    Filed: December 17, 2014
    Date of Patent: November 7, 2017
    Assignee: Upguard, Inc.
    Inventors: Alan James Sharp-Paul, Michael Franz Baukes
  • Publication number: 20170244761
    Abstract: Computer nodes in a network manage the configuration of neighbor nodes and enforce policy compliance by scanning neighboring nodes and taking corrective action based on consensus. A testing node scans a neighboring target node and identifies if the target node violates the policy. The testing node requests common neighbors of the target node to repeat the scan. If the common neighbors agree that the target node violates the policy, a corrective action is taken to ensure compliance with the policy. Corrective action includes reconfiguration of the target node. Nodes also perform negative checking to ensure adherence to separation rules restricting interaction between neighboring nodes. A testing node attempts to perform a restricted action with a neighboring restricted node. If the restricted action is successful, the testing node takes corrective action on the target node to ensure that subsequent attempts to perform the restriction action are denied access in compliance with the policy.
    Type: Application
    Filed: February 20, 2016
    Publication date: August 24, 2017
    Inventors: Michael Franz Baukes, Alan James Sharp-Paul