Patents by Inventor Jeffrey J. Fielding
Jeffrey J. Fielding has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12253662Abstract: In an embodiment, a method includes obtaining radiation emitted from a radiation source. The method includes modulating the radiation with a time-varying modulation to generate a time-varying illumination pattern with a known modulation. The illumination pattern includes a time-varying intensity for each of a plurality of spatial locations. The method includes illuminating a target volume with the illumination pattern. The method includes collecting a signal generated by one or more objects within the target volume in response to illumination by the illumination pattern. The method includes estimating a location of each of the one or more objects based on the collected signal and the known modulation.Type: GrantFiled: January 25, 2022Date of Patent: March 18, 2025Assignee: COLORADO STATE UNIVERSITY RESEARCH FOUNDATIONInventors: Randy A. Bartels, Jeffrey J. Field
-
Patent number: 11451392Abstract: In some implementations, tokens that are representative of sensitive data may be used in place of the sensitive data to maintain the security of the sensitive data. For example, data may be separated into sensitive data and nonsensitive data, and at least the sensitive data is securely delivered to a data storage service. The data storage service generates a token that is representative of the sensitive data and stores the sensitive data as secure data. The data storage service may deliver the token to an entity that also receives the nonsensitive data, and the entity may use the token in place of the sensitive data. In some implementations, different tokens are generated each time the same piece of sensitive data is submitted for storage as secure data. Further, in some implementations, An expiration time may be assigned to sensitive data, and expired data and associated tokens may be deleted.Type: GrantFiled: July 6, 2018Date of Patent: September 20, 2022Assignee: Amazon Technologies, Inc.Inventors: Jonathan Kozolchyk, Darren E. Canavor, Jeffrey J. Fielding, Vaibhav Mallya, Darin Keith McAdams
-
Publication number: 20220236189Abstract: In an example embodiment, a method includes emitting broad bandwidth radiation with high spatial coherence. The method includes applying a time-varying modulation to the broad bandwidth radiation. The method includes identifying optical interactions caused by the time-varying modulation of the broad bandwidth radiation. The method includes identifying one or more signals included in the optical interactions. The method includes extracting one or more respective spectral signatures associated with each respective signal of the one or more signals. The method includes determining a respective characteristic of an optically interacting material that corresponds to a respective spectral signature of the extracted spectral signatures. The method includes identifying one or more optically interacting materials by classifying one or more of the characteristics.Type: ApplicationFiled: January 25, 2022Publication date: July 28, 2022Inventors: Randy A. Bartels, Jeffrey J. Field
-
Publication number: 20220236549Abstract: In an embodiment, a method includes obtaining radiation emitted from a radiation source. The method includes modulating the radiation with a time-varying modulation to generate a time-varying illumination pattern with a known modulation. The illumination pattern includes a time-varying intensity for each of a plurality of spatial locations. The method includes illuminating a target volume with the illumination pattern. The method includes collecting a signal generated by one or more objects within the target volume in response to illumination by the illumination pattern. The method includes estimating a location of each of the one or more objects based on the collected signal and the known modulation.Type: ApplicationFiled: January 25, 2022Publication date: July 28, 2022Inventors: Randy A. Bartels, Jeffrey J. Field
-
Patent number: 11212291Abstract: A security service enables service providers to register available services. Prospective service consumers may register with the security service to access a particular registered service, and may specify conditions for access that are subject to approval by the corresponding service provider. Based on the registrations of the service provider and the service consumer, the security service can define access policies that may be enforced to control the conditions under which a service consumer accesses or utilizes the particular service. Additionally, changes to the access policies may be propagated to running services in near real time. Some implementations enable masking of information provided to particular service consumers based on determined needs of each service consumer for access to particular information. In some instances, the service providers may provide log information to the security service, which may be monitored to identify anomalies, security breaches or the like.Type: GrantFiled: June 26, 2019Date of Patent: December 28, 2021Assignee: Amazon Technologies, Inc.Inventors: Jonathan Kozolchyk, Darin Keith McAdams, Jeffrey J. Fielding, Vaibhav Mallya, Darren E. Canavor
-
Publication number: 20190319963Abstract: A security service enables service providers to register available services. Prospective service consumers may register with the security service to access a particular registered service, and may specify conditions for access that are subject to approval by the corresponding service provider. Based on the registrations of the service provider and the service consumer, the security service can define access policies that may be enforced to control the conditions under which a service consumer accesses or utilizes the particular service. Additionally, changes to the access policies may be propagated to running services in near real time. Some implementations enable masking of information provided to particular service consumers based on determined needs of each service consumer for access to particular information. In some instances, the service providers may provide log information to the security service, which may be monitored to identify anomalies, security breaches or the like.Type: ApplicationFiled: June 26, 2019Publication date: October 17, 2019Inventors: Jonathan Kozolchyk, Darin Keith McAdams, Jeffrey J. Fielding, Vaibhav Mallya, Darren E. Canavor
-
Patent number: 10356104Abstract: A security service enables service providers to register available services. Prospective service consumers may register with the security service to access a particular registered service, and may specify conditions for access that are subject to approval by the corresponding service provider. Based on the registrations of the service provider and the service consumer, the security service can define access policies that may be enforced to control the conditions under which a service consumer accesses or utilizes the particular service. Additionally, changes to the access policies may be propagated to running services in near real time. Some implementations enable masking of information provided to particular service consumers based on determined needs of each service consumer for access to particular information. In some instances, the service providers may provide log information to the security service, which may be monitored to identify anomalies, security breaches or the like.Type: GrantFiled: May 25, 2018Date of Patent: July 16, 2019Assignee: Amazon Technologies, Inc.Inventors: Jonathan Kozolchyk, Darin Keith McAdams, Jeffrey J. Fielding, Vaibhav Mallya, Darren E. Canavor
-
Publication number: 20180316501Abstract: In some implementations, tokens that are representative of sensitive data may be used in place of the sensitive data to maintain the security of the sensitive data. For example, data may be separated into sensitive data and nonsensitive data, and at least the sensitive data is securely delivered to a data storage service. The data storage service generates a token that is representative of the sensitive data and stores the sensitive data as secure data. The data storage service may deliver the token to an entity that also receives the nonsensitive data, and the entity may use the token in place of the sensitive data. In some implementations, different tokens are generated each time the same piece of sensitive data is submitted for storage as secure data. Further, in some implementations, An expiration time may be assigned to sensitive data, and expired data and associated tokens may be deleted.Type: ApplicationFiled: July 6, 2018Publication date: November 1, 2018Inventors: Jonathan Kozolchyk, Darren E. Canavor, Jeffrey J. Fielding, Vaibhav Mallya, Darin Keith McAdams
-
Publication number: 20180278621Abstract: A security service enables service providers to register available services. Prospective service consumers may register with the security service to access a particular registered service, and may specify conditions for access that are subject to approval by the corresponding service provider. Based on the registrations of the service provider and the service consumer, the security service can define access policies that may be enforced to control the conditions under which a service consumer accesses or utilizes the particular service. Additionally, changes to the access policies may be propagated to running services in near real time. Some implementations enable masking of information provided to particular service consumers based on determined needs of each service consumer for access to particular information. In some instances, the service providers may provide log information to the security service, which may be monitored to identify anomalies, security breaches or the like.Type: ApplicationFiled: May 25, 2018Publication date: September 27, 2018Inventors: Jonathan Kozolchyk, Darin Keith McAdams, Jeffrey J. Fielding, Vaibhav Mallya, Darren E. Canavor
-
Patent number: 10073025Abstract: Systems and methods are disclosed to determine the axial and/or lateral location of a particle using light modulated with temporal and/or spatial modulation pattern. The system, for example, may include a modulator configured to temporally modulate an intensity pattern of a line of light uniquely at each point along a lateral length of the line of light and produce an undiffracted modulated line of light, a first first-order diffracted line of light, and a second first-order diffracted line of light; and one or more optical elements configured to direct the undiffracted line of light and one of the first first-order diffracted line of light and the second first-order diffracted line of light toward at least one particle disposed at or near a sample region. The system may include a processor configured to determine an axial and/or a lateral position of the particle disposed at or near the sample region.Type: GrantFiled: March 24, 2015Date of Patent: September 11, 2018Assignee: Colorado State University Research FoundationInventors: Randy Bartels, Jeffrey J. Field, David G. Winters
-
Patent number: 10020942Abstract: In some implementations, tokens that are representative of sensitive data may be used in place of the sensitive data to maintain the security of the sensitive data. For example, data may be separated into sensitive data and nonsensitive data, and at least the sensitive data is securely delivered to a data storage service. The data storage service generates a token that is representative of the sensitive data and stores the sensitive data as secure data. The data storage service may deliver the token to an entity that also receives the nonsensitive data, and the entity may use the token in place of the sensitive data. In some implementations, different tokens are generated each time the same piece of sensitive data is submitted for storage as secure data. Further, in some implementations, An expiration time may be assigned to sensitive data, and expired data and associated tokens may be deleted.Type: GrantFiled: August 3, 2017Date of Patent: July 10, 2018Assignee: Amazon Technologies, Inc.Inventors: Jonathan Kozolchyk, Darren E. Canavor, Jeffrey J. Fielding, Vaibhav Mallya, Darin Keith McAdams
-
Patent number: 9985974Abstract: A security service enables service providers to register available services. Prospective service consumers may register with the security service to access a particular registered service, and may specify conditions for access that are subject to approval by the corresponding service provider. Based on the registrations of the service provider and the service consumer, the security service can define access policies that may be enforced to control the conditions under which a service consumer accesses or utilizes the particular service. Additionally, changes to the access policies may be propagated to running services in near real time. Some implementations enable masking of information provided to particular service consumers based on determined needs of each service consumer for access to particular information. In some instances, the service providers may provide log information to the security service, which may be monitored to identify anomalies, security breaches or the like.Type: GrantFiled: March 9, 2017Date of Patent: May 29, 2018Assignee: Amazon Technologies, Inc.Inventors: Jonathan Kozolchyk, Darin Keith McAdams, Jeffrey J. Fielding, Vaibhav Mallya, Darren E. Canavor
-
Publication number: 20170331629Abstract: In some implementations, tokens that are representative of sensitive data may be used in place of the sensitive data to maintain the security of the sensitive data. For example, data may be separated into sensitive data and nonsensitive data, and at least the sensitive data is securely delivered to a data storage service. The data storage service generates a token that is representative of the sensitive data and stores the sensitive data as secure data. The data storage service may deliver the token to an entity that also receives the nonsensitive data, and the entity may use the token in place of the sensitive data. In some implementations, different tokens are generated each time the same piece of sensitive data is submitted for storage as secure data. Further, in some implementations, An expiration time may be assigned to sensitive data, and expired data and associated tokens may be deleted.Type: ApplicationFiled: August 3, 2017Publication date: November 16, 2017Inventors: Jonathan Kozolchyk, Darren E. Canavor, Jeffrey J. Fielding, Vaibhav Mallya, Darin Keith McAdams
-
Patent number: 9756023Abstract: In some implementations, tokens that are representative of sensitive data may be used in place of the sensitive data to maintain the security of the sensitive data. For example, data may be separated into sensitive data and nonsensitive data, and at least the sensitive data is securely delivered to a data storage service. The data storage service generates a token that is representative of the sensitive data and stores the sensitive data as secure data. The data storage service may deliver the token to an entity that also receives the nonsensitive data, and the entity may use the token in place of the sensitive data. In some implementations, different tokens are generated each time the same piece of sensitive data is submitted for storage as secure data. Further, in some implementations, access policies define authorizations regarding which entities are able to resolve a token to access the actual sensitive data.Type: GrantFiled: August 12, 2016Date of Patent: September 5, 2017Assignee: Amazon Technologies, Inc.Inventors: Jonathan Kozolchyk, Darren E. Canavor, Jeffrey J. Fielding, Vaibhav Mallya, Darin Keith McAdams
-
Publication number: 20170184483Abstract: Systems and methods are disclosed to determine the axial and/or lateral location of a particle using light modulated with temporal and/or spatial modulation pattern. The system, for example, may include a modulator configured to temporally modulate an intensity pattern of a line of light uniquely at each point along a lateral length of the line of light and produce an undiffracted modulated line of light, a first first-order diffracted line of light, and a second first-order diffracted line of light; and one or more optical elements configured to direct the undiffracted line of light and one of the first first-order diffracted line of light and the second first-order diffracted line of light toward at least one particle disposed at or near a sample region. The system may include a processor configured to determine an axial and/or a lateral position of the particle disposed at or near the sample region.Type: ApplicationFiled: March 24, 2015Publication date: June 29, 2017Inventors: Randy Bartels, Jeffrey J. Field, David G. Winters
-
Publication number: 20170180389Abstract: A security service enables service providers to register available services. Prospective service consumers may register with the security service to access a particular registered service, and may specify conditions for access that are subject to approval by the corresponding service provider. Based on the registrations of the service provider and the service consumer, the security service can define access policies that may be enforced to control the conditions under which a service consumer accesses or utilizes the particular service. Additionally, changes to the access policies may be propagated to running services in near real time. Some implementations enable masking of information provided to particular service consumers based on determined needs of each service consumer for access to particular information. In some instances, the service providers may provide log information to the security service, which may be monitored to identify anomalies, security breaches or the like.Type: ApplicationFiled: March 9, 2017Publication date: June 22, 2017Inventors: Jonathan Kozolchyk, Darin Keith McAdams, Jeffrey J. Fielding, Vaibhav Mallya, Darren E. Canavor
-
Patent number: 9596244Abstract: A security service enables service providers to register available services. Prospective service consumers may register with the security service to access a particular registered service, and may specify conditions for access that are subject to approval by the corresponding service provider. Based on the registrations of the service provider and the service consumer, the security service can define access policies that may be enforced to control the conditions under which a service consumer accesses or utilizes the particular service. Additionally, changes to the access policies may be propagated to running services in near real time. Some implementations enable masking of information provided to particular service consumers based on determined needs of each service consumer for access to particular information. In some instances, the service providers may provide log information to the security service, which may be monitored to identify anomalies, security breaches or the like.Type: GrantFiled: June 16, 2011Date of Patent: March 14, 2017Assignee: Amazon Technologies, Inc.Inventors: Jonathan Kozolchyk, Darin Keith McAdams, Jeffrey J Fielding, Vaibhav Mallya, Darren E. Canavor
-
Publication number: 20160352695Abstract: In some implementations, tokens that are representative of sensitive data may be used in place of the sensitive data to maintain the security of the sensitive data. For example, data may be separated into sensitive data and nonsensitive data, and at least the sensitive data is securely delivered to a data storage service. The data storage service generates a token that is representative of the sensitive data and stores the sensitive data as secure data. The data storage service may deliver the token to an entity that also receives the nonsensitive data, and the entity may use the token in place of the sensitive data. In some implementations, different tokens are generated each time the same piece of sensitive data is submitted for storage as secure data. Further, in some implementations, access policies define authorizations regarding which entities are able to resolve a token to access the actual sensitive data.Type: ApplicationFiled: August 12, 2016Publication date: December 1, 2016Inventors: Jonathan Kozolchyk, Darren E. Canavor, Jeffrey J. Fielding, Vaibhav Mallya, Darin Keith McAdams
-
Patent number: 9430308Abstract: Disclosed are various embodiments for network monitoring. A processor circuit having a processor and a memory is employed. A listing of components of a network is stored in the memory, the listing including a plurality of endpoints and a plurality of nodes. One of the endpoints includes a processor circuit. A monitoring application is stored in the memory and executable by the processor circuit. The monitoring application is configured to maintain in the memory an indication of an operational status of each of the nodes derived from a plurality of status requests transmitted between respective pairs of the endpoints.Type: GrantFiled: May 1, 2015Date of Patent: August 30, 2016Assignee: Amazon Technologies, Inc.Inventors: David A. Cuthbert, Sergei V. Shinkarev, Jeffrey J. Fielding, Ting-You Wang
-
Patent number: 9419841Abstract: In some implementations, tokens that are representative of sensitive data may be used in place of the sensitive data to maintain the security of the sensitive data. For example, data may be separated into sensitive data and nonsensitive data, and at least the sensitive data is securely delivered to a data storage service. The data storage service generates a token that is representative of the sensitive data and stores the sensitive data as secure data. The data storage service may deliver the token to an entity that also receives the nonsensitive data, and the entity may use the token in place of the sensitive data. In some implementations, different tokens are generated each time the same piece of sensitive data is submitted for storage as secure data. Further, in some implementations, access policies define authorizations regarding which entities are able to resolve a token to access the actual sensitive data.Type: GrantFiled: June 29, 2011Date of Patent: August 16, 2016Assignee: Amazon Technologies, Inc.Inventors: Jonathan Kozolchyk, Darren E. Canavor, Jeffrey J. Fielding, Vaibhav Mallya, Darin Keith McAdams