Patents by Inventor James Whitmore

James Whitmore has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12163952
    Abstract: Provided herein are methods, compositions and articles of manufacture for use in connection with cell therapy involving the administration of one or more doses of a therapeutic T cell composition. The cells of the T cell composition express recombinant receptors such as chimeric receptors, e.g. chimeric antigen receptors (CARs) or other transgenic receptors such as T cell receptors (TCRs). Features of the provided embodiments, including the numbers of cells or units of cells administered and/or the potency of administered cells, provide various advantages, such as lower risk of toxicity in subjects administered the T cell compositions.
    Type: Grant
    Filed: February 27, 2018
    Date of Patent: December 10, 2024
    Assignee: Juno Therapeutics, Inc.
    Inventors: Brian Christin, Michael Gerard Covington, Kedar Himanshu Dave, Richard James Getto, Jr., Tom Kowski, Ryan P. Larson, Christopher Glen Ramsborg, Nikolaus Sebastian Trede, Clinton Weber, James Boyd Whitmore, Nathan Yee, Pascal Beauchesne, Travis Beckett, Samuel Charles Blackman, Nathaniel Chartrand, Mel Davis-Pickett, Mark Gilbert, Nathaniel Lambert, He Li, Mary Mallaney, Kathryn Lindsay Pollock, Valerie Odegard, Jeff Smith, Claire Sutherland, Andrew W. Walker
  • Patent number: 12015636
    Abstract: An automated method, system, device and/or computer program for performing security analysis of an information system or computing device by modeling attacks and attack surfaces using Knowledge Graphs and Graph Computing systems. A contextual data model and a set of data instances of security knowledge can be accessed. A Knowledge Graph representing a Simulated Neural Network for security attacks can be built and trained. A security analysis tool can receive a description of an attack scenario. The Graph Computing system can analyze an attack scenario using the Security Attack Knowledge Graph. A set of observations about the attack scenario and the attack surface can be generated. The observations can include attack paths, recommendations and action plans on how to detect, prevent or address the attack scenario. The action plans can be invoked and applied to the target information system and its operating environment either manually, or by automation.
    Type: Grant
    Filed: July 30, 2022
    Date of Patent: June 18, 2024
    Inventor: James Whitmore
  • Publication number: 20240039944
    Abstract: An automated method, system, device and/or computer program for performing security analysis of an information system or computing device by modeling attacks and attack surfaces using Knowledge Graphs and Graph Computing systems. A contextual data model and a set of data instances of security knowledge can be accessed. A Knowledge Graph representing a Simulated Neural Network for security attacks can be built and trained. A security analysis tool can receive a description of an attack scenario. The Graph Computing system can analyze an attack scenario using the Security Attack Knowledge Graph. A set of observations about the attack scenario and the attack surface can be generated. The observations can include attack paths, recommendations and action plans on how to detect, prevent or address the attack scenario. The action plans can be invoked and applied to the target information system and its operating environment either manually, or by automation.
    Type: Application
    Filed: July 30, 2022
    Publication date: February 1, 2024
    Inventor: James Whitmore
  • Publication number: 20070266437
    Abstract: A system and method of designing a secure solution which meets the needs of a customer but which is appropriate and repeatable and may use components which are insecure or not trusted. In its preferred embodiment, the security system includes subsystems selected from access control, information flow, identity and credentials management, integrity and assurance. In each subsystem, elements are employed to reduce the effect of perils and to provide a repeatable system design.
    Type: Application
    Filed: May 30, 2007
    Publication date: November 15, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Arthur Gilbert, James Whitmore
  • Publication number: 20070044151
    Abstract: A system integrity manager, system, computer program product and method for providing security may include transforming an operational behavior of an instance of a computing system from a general purpose computing system to a special purpose computing system. The operational behavior may be transformed by using at least one of a system integrity sensor and a system integrity effector and a set of system integrity policies and system integrity data.
    Type: Application
    Filed: August 22, 2005
    Publication date: February 22, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: James Whitmore
  • Publication number: 20060036479
    Abstract: A system and method for generating an information technology solution. A system for generating a runtime model is provided, comprising: a system for selecting a business pattern; a system for providing a management integration table, wherein the management integration table includes a plurality of cells, each representing at least one management application pattern; and a system for generating a runtime model from the selected business pattern and management integration table, wherein the generating system supplements the business pattern with additive patterns, bridge patterns, and management application patterns in order to generate the runtime model.
    Type: Application
    Filed: August 13, 2004
    Publication date: February 16, 2006
    Applicant: International Business Machines Corporation
    Inventor: James Whitmore