Patents by Inventor James W. Handley

James W. Handley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230096901
    Abstract: A method for tracking an object can include receiving first data input including first feature values of features that indicate a first position. The method can further include generating a first grid of cells representing an object track with the received feature values within an extent of the first grid of cells. The method can further include receiving second data input including second feature values of the features that indicate a second position. The method can further include, in response to determining the second feature values are within the extent of the first grid of cells adding a point corresponding to the second feature values to the first grid of cells to associate the point to an object track.
    Type: Application
    Filed: February 17, 2021
    Publication date: March 30, 2023
    Inventors: Holger M. Jaenisch, James W. Handley, Michael D. Dubois
  • Patent number: 11580331
    Abstract: A method can include identifying a first key value of a first cell of a first grid of grids of cells to which a first feature maps, embedding the first grid into each cell of a second grid, identifying a second key value of a second cell of the second grid to which a second feature maps, the second key value representative of the first and second key values, comparing the identified key value to the key values of a memory, in response to determining the identified key value is in the memory, and providing data indicating a class associated with the identified key value in the memory.
    Type: Grant
    Filed: October 25, 2019
    Date of Patent: February 14, 2023
    Assignee: Raytheon Company
    Inventors: Holger M. Jaenisch, James W. Handley
  • Patent number: 11507847
    Abstract: Gene expression programming-based behavior monitoring is disclosed. A machine receives, as input, a plurality of data examples. A method can include receiving data indicating behaviors of the device, determining, using a gene expression programming (GEP) method, a data model that explains the data, and comparing further data indicating further behavior of the device to the data model to determine whether the further behavior is explained by the data model.
    Type: Grant
    Filed: July 25, 2019
    Date of Patent: November 22, 2022
    Assignee: Raytheon Company
    Inventors: Holger M. Jaenisch, James W. Handley
  • Patent number: 11436537
    Abstract: A method can include determining a cell of a grid to which a first feature and a second feature of each of a plurality of input/output examples maps, determining an average of respective features of the cell to generate respective level 2 synthetic feature vectors, for each cell with an input/output example of the input/output examples mapped thereto, generating a sub-grid of cells and map the input/output examples mapped to a cell of the sub-grid, determining an average of respective features to generate respective level 1 synthetic feature vectors comprising the average of the respective features, training the ML technique using the level 2 synthetic feature vector, testing the trained ML technique using the level 1 synthetic feature vector of each sub-cell, and further testing the trained ML technique using the input/output examples to generate a class and confidence for each of the input/output examples.
    Type: Grant
    Filed: March 8, 2019
    Date of Patent: September 6, 2022
    Assignee: Raytheon Company
    Inventors: Holger M. Jaenisch, James W. Handley, Guy G. Swope
  • Patent number: 11381599
    Abstract: A method of generating cyber chaff can include determining a cell of a grid of cells to which a first feature and a second feature of user data maps, identifying a cell type of the cell, the cell type indicating whether the cell is an active cell, an inactive cell, or a sub-process cell, and providing cyber chaff based on cyber chaff data associated with either (a) one or more cells of the inactive cell type or (b) one or more cells of the sub-process cell type.
    Type: Grant
    Filed: April 9, 2019
    Date of Patent: July 5, 2022
    Assignee: Raytheon Company
    Inventors: Holger M. Jaenisch, James W. Handley, Michael J. Lambert, Brandon Woolley, William L. Cram, Ross MacKinnon, Mark A. Bradbury, Guy G. Swope
  • Patent number: 11341235
    Abstract: A method of identifying anomalous behavior can include determining a first feature value and a second feature value of a series of numbers, identifying whether the determined first and second feature values map to a cell that is a part of a group based on spatial voting (SV) grid data, the SV grid data indicating an extent of each cell in a grid of cells, a number of rows and columns of cells in a group of cells, and, for each group of cells, a point in the center cell of the group of cells and a unique group number, and in response to identifying that the determined first and second feature values do not map to a cell of the grid of cells that is a part of a group, tagging the first and second feature values as corresponding to an anomalous behavior.
    Type: Grant
    Filed: February 21, 2019
    Date of Patent: May 24, 2022
    Assignee: Raytheon Company
    Inventors: Holger M. Jaenisch, James W. Handley
  • Patent number: 11340603
    Abstract: Embedded convolutional data modeling is disclosed. A machine receives, as input, a plurality of data examples. The machine generates an embedded convolutional data model for the data examples. The machine outputs a source code for the model.
    Type: Grant
    Filed: April 11, 2019
    Date of Patent: May 24, 2022
    Assignee: Raytheon Company
    Inventors: Holger M. Jaenisch, James W. Handley
  • Patent number: 11321462
    Abstract: A method of identifying anomalous behavior can include transforming input data to a series of numbers, determining first features and second features of the series of numbers that, given the same numbers in a different order, produce a different value for the respective feature, encoding the series of numbers by a key value indicating a number associated with a cell of a grid of cells to which the first and second features map, and determining, based on whether the key value has been previously provided, whether the input is anomalous.
    Type: Grant
    Filed: February 1, 2019
    Date of Patent: May 3, 2022
    Assignee: Raytheon Company
    Inventors: Holger M. Jaenisch, James W. Handley, Tonja L. Rogers
  • Patent number: 11132923
    Abstract: A method of encryption using spatial voting can include determining a first feature and a second feature of user data, wherein the first feature and the second feature correspond to a cell of a subset of cells of a grid of cells, each cell of the subset of cells including a character associated therewith, altering one or more values of the first feature and the second feature to generate an altered first feature and an altered second feature, and concatenating the altered first feature and the altered second feature to generate encrypted data.
    Type: Grant
    Filed: April 9, 2019
    Date of Patent: September 28, 2021
    Assignee: Raytheon Company
    Inventors: Holger M. Jaenisch, James W. Handley, Guy G. Swope
  • Publication number: 20210124998
    Abstract: A method can include identifying a first key value of a first cell of a first grid of grids of cells to which a first feature maps, embedding the first grid into each cell of a second grid, identifying a second key value of a second cell of the second grid to which a second feature maps, the second key value representative of the first and second key values, comparing the identified key value to the key values of a memory, in response to determining the identified key value is in the memory, and providing data indicating a class associated with the identified key value in the memory.
    Type: Application
    Filed: October 25, 2019
    Publication date: April 29, 2021
    Inventors: Holger M. Jaenisch, James W. Handley
  • Patent number: 10937465
    Abstract: A method can include identifying, by processing circuitry of a device, a row of rows and/or column of columns to which a first feature and a second feature of an input maps, comparing the identified row and/or column to a row run length encoding (RLE) in a memory of the device that indicates, for each row, whether one or more cells in the row include an input mapped thereto or a column RLE in a memory of the device that indicates, for each column, whether one or more cells in the column include an input mapped thereto, respectively, and determining the input data is anomalous in response to determining either the row RLE indicates that no inputs are mapped to the row to which the input maps, or the column RLE indicates that no inputs are mapped to the column to which the input maps.
    Type: Grant
    Filed: February 21, 2019
    Date of Patent: March 2, 2021
    Assignee: Raytheon Company
    Inventors: Holger M. Jaenisch, James W. Handley
  • Publication number: 20210027171
    Abstract: Gene expression programming-based behavior monitoring is disclosed. A machine receives, as input, a plurality of data examples. A method can include receiving data indicating behaviors of the device, determining, using a gene expression programming (GEP) method, a data model that explains the data, and comparing further data indicating further behavior of the device to the data model to determine whether the further behavior is explained by the data model.
    Type: Application
    Filed: July 25, 2019
    Publication date: January 28, 2021
    Inventors: Holger M. Jaenisch, James W. Handley
  • Publication number: 20200326695
    Abstract: Embedded convolutional data modeling is disclosed. A machine receives, as input, a plurality of data examples. The machine generates an embedded convolutional data model for the data examples. The machine outputs a source code for the model.
    Type: Application
    Filed: April 11, 2019
    Publication date: October 15, 2020
    Inventors: Holger M. Jaenisch, James W. Handley
  • Publication number: 20200272731
    Abstract: A method of identifying anomalous behavior can include determining a first feature value and a second feature value of a series of numbers, identifying whether the determined first and second feature values map to a cell that is a part of a group based on spatial voting (SV) grid data, the SV grid data indicating an extent of each cell in a grid of cells, a number of rows and columns of cells in a group of cells, and, for each group of cells, a point in the center cell of the group of cells and a unique group number, and in response to identifying that the determined first and second feature values do not map to a cell of the grid of cells that is a part of a group, tagging the first and second feature values as corresponding to an anomalous behavior.
    Type: Application
    Filed: February 21, 2019
    Publication date: August 27, 2020
    Inventors: Holger M. Jaenisch, James W. Handley
  • Publication number: 20200273499
    Abstract: A method can include identifying, by processing circuitry of a device, a row of rows and/or column of columns to which a first feature and a second feature of an input maps, comparing the identified row and/or column to a row run length encoding (RLE) in a memory of the device that indicates, for each row, whether one or more cells in the row include an input mapped thereto or a column RLE in a memory of the device that indicates, for each column, whether one or more cells in the column include an input mapped thereto, respectively, and determining the input data is anomalous in response to determining either the row RLE indicates that no inputs are mapped to the row to which the input maps, or the column RLE indicates that no inputs are mapped to the column to which the input maps.
    Type: Application
    Filed: February 21, 2019
    Publication date: August 27, 2020
    Inventors: Holger M. Jaenisch, James W. Handley
  • Publication number: 20200202749
    Abstract: A method of encryption using spatial voting can include determining a first feature and a second feature of user data, wherein the first feature and the second feature correspond to a cell of a subset of cells of a grid of cells, each cell of the subset of cells including a character associated therewith, altering one or more values of the first feature and the second feature to generate an altered first feature and an altered second feature, and concatenating the altered first feature and the altered second feature to generate encrypted data.
    Type: Application
    Filed: April 9, 2019
    Publication date: June 25, 2020
    Inventors: Holger M. Jaenisch, James W. Handley, Guy G. Swope
  • Publication number: 20190383874
    Abstract: Presented herein are alternatives to design of experiments. A method can include sampling a model that explains a measurement corpus of measurement data to generate a sampled model, identifying an invalid region of the sampled model, determining whether a device will operate within the identified invalid region, if the device will operate within the identified invalid region, causing further measurement data to be captured in the identified invalid region, and generating a new model, based only on the further measurement data, to explain device operation within the identified invalid region that augments the sampled model to explain the device behavior.
    Type: Application
    Filed: August 28, 2019
    Publication date: December 19, 2019
    Inventors: Holger M. Jaenisch, James W. Handley, Louis J. Gullo
  • Publication number: 20190311120
    Abstract: A method of identifying anomalous behavior can include transforming input data to a series of numbers, determining first features and second features of the series of numbers that, given the same numbers in a different order, produce a different value for the respective feature, encoding the series of numbers by a key value indicating a number associated with a cell of a grid of cells to which the first and second features map, and determining, based on whether the key value has been previously provided, whether the input is anomalous.
    Type: Application
    Filed: February 1, 2019
    Publication date: October 10, 2019
    Inventors: Holger M. Jaenisch, James W. Handley, Tonja L. Rogers
  • Publication number: 20190312908
    Abstract: A method of generating cyber chaff can include determining a cell of a grid of cells to which a first feature and a second feature of user data maps, identifying a cell type of the cell, the cell type indicating whether the cell is an active cell, an inactive cell, or a sub-process cell, and providing cyber chaff based on cyber chaff data associated with either (a) one or more cells of the inactive cell type or (b) one or more cells of the sub-process cell type.
    Type: Application
    Filed: April 9, 2019
    Publication date: October 10, 2019
    Inventors: Holger M. Jaenisch, James W. Handley, Michael J. Lambert, Brandon Woolley, William L. Cram, Ross MacKinnon, Mark A. Bradbury, Guy G. Swope
  • Publication number: 20190279112
    Abstract: A method can include determining a cell of a grid to which a first feature and a second feature of each of a plurality of input/output examples maps, determining an average of respective features of the cell to generate respective level 2 synthetic feature vectors, for each cell with an input/output example of the input/output examples mapped thereto, generating a sub-grid of cells and map the input/output examples mapped to a cell of the sub-grid, determining an average of respective features to generate respective level 1 synthetic feature vectors comprising the average of the respective features, training the ML technique using the level 2 synthetic feature vector, testing the trained ML technique using the level 1 synthetic feature vector of each sub-cell, and further testing the trained ML technique using the input/output examples to generate a class and confidence for each of the input/output examples.
    Type: Application
    Filed: March 8, 2019
    Publication date: September 12, 2019
    Inventors: Holger M. Jaenisch, James W. Handley, Guy G. Swope