Patents by Inventor John Parkinson

John Parkinson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200337331
    Abstract: The present invention relates to the field of confectionery production, particularly to the use of a modular, flexible process and the use thereof in combination with the confectionery cooling step of the present invention.
    Type: Application
    Filed: October 26, 2018
    Publication date: October 29, 2020
    Inventors: Peng-Siong Chong, Mark Robert Knapp, John Parkinson, Stephen Chapman
  • Publication number: 20200336449
    Abstract: Methods, computer-readable media, software, and apparatuses may assist a consumer in unsubscribing to unwanted mailing list traffic and email based relationships. A consumer's discovered accounts and subscriptions may be listed and displayed to the consumer. For each identified account or subscription, the unsubscribe method may be determined and automated for the consumer.
    Type: Application
    Filed: March 20, 2019
    Publication date: October 22, 2020
    Inventor: John Parkinson
  • Publication number: 20200308181
    Abstract: This invention is directed to compounds of formula (I): where r, q, R, R2, R3, R4, R5a, R5b, R5c, R6a, R6b, R6c, R7, R8, and R9 are described herein, as single stereoisomers or as mixtures of stereoisomers, or pharmaceutically acceptable salts, solvates, clathrates, polymorphs, ammonium ions, N-oxides or prodrugs thereof; which are leukotriene A4 hydrolase inhibitors and therefore useful in treating inflammatory disorders. Pharmaceutical compositions comprising the compounds of the invention and methods of preparing the compounds of the invention are also disclosed.
    Type: Application
    Filed: January 9, 2020
    Publication date: October 1, 2020
    Inventors: Damian O. Arnaiz, Greg Brown, Emmanuel Claret, Arwed Cleve, David Davey, William Guilford, Seock-Kyu Khim, Thomas Kirkland, Monica J. Kochanny, Amy Liang, David Light, John Parkinson, Guo Ping Wei, Bin Ye
  • Publication number: 20200304592
    Abstract: Methods, computer-readable media, software, and apparatuses may assist the user in understanding their unique digital footprint and the connections from the data within the footprint to the user's connections online and in the physical world. The determined information may be visually displayed to the user along with recommendations regarding digital safety.
    Type: Application
    Filed: March 20, 2019
    Publication date: September 24, 2020
    Inventors: Jason Park, Nicolette De Guia, Mark D. Hansen, Dongmin Liu, Amaeya Kalke, Sergio G. Montero, John Parkinson, Cindy Weidmann
  • Patent number: 10768902
    Abstract: A method of operating a computer according to an actor model, the method comprising: defining a plurality of actors, each taking form of a data structure comprising respective data and one or more respective functions for operating on the respective data; generating a wrapped message to be transmitted from a transmitting actor to multiple recipient actors, the wrapped message comprising at least one constituent message, a sorted list of the recipient actors, and an index indicating an entry in the list, the index initially being set to indicate the first recipient actor in the list; transmitting the wrapped message from the transmitting actor to the first recipient actor in the list; each of the recipient actors, except the last in the list, upon receiving the wrapped message, advancing the index and forwarding the wrapped message to the next actor in the list as indicated by the advanced index.
    Type: Grant
    Filed: July 23, 2018
    Date of Patent: September 8, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Sylvan Wesley Clebsch, Matthew John Parkinson
  • Publication number: 20200202037
    Abstract: Methods, computer-readable media, software, and apparatuses may assist a consumer in keeping to their preferred privacy preferences when making a purchase online. Differences between the privacy policy of a vender and the privacy preferences of the consumer may be output for display to the consumer, along with alternative vendor recommendations, including vendors having privacy policies more closely match with the privacy preferences of the consumer.
    Type: Application
    Filed: December 21, 2018
    Publication date: June 25, 2020
    Applicant: Allstate Insurance Company
    Inventors: John Parkinson, Nicolette De Guia, Margaret K. Striebich
  • Publication number: 20200158471
    Abstract: Systems and methods for interfacing an artillery unit control panel emulator with a collective training environment are disclosed. One method includes reading output data including one or more output data segments generated by the artillery unit control panel emulator. The method includes examining the output data to identify a trigger event in the one or more output data segments. The method includes extracting details regarding the trigger event from the one or more output data segments. The method includes creating a message indicative of the trigger event and including the details regarding the trigger event. The method includes sending, via a communication interface, the message to a device within the collective training environment.
    Type: Application
    Filed: November 11, 2019
    Publication date: May 21, 2020
    Inventors: Martyn Armstrong, Neale Smiles, Alastair Parkinson, John Gardiner, Jason Mayo, Robert Spriggs
  • Publication number: 20200106746
    Abstract: Connecting to an unsecured wired or wireless network poses severe security and privacy risks. An individual application such as a mobile online banking application address this by using point to point private network connections. Browsers, however, generally do not use point to point private network connections and depend on the target website to establish a secure connection. Providing a secure connection that is the default for all network access and that encrypts all over the air or over the wire traffic mitigates these risks. However, virtual client networks (VPNs) client applications can be difficult to set up and need to be always on to ensure that all network activity is secure. By embedding a VPN capability and automating the connection process, a safe and secure network connection can be made available to users of computing devices.
    Type: Application
    Filed: October 2, 2018
    Publication date: April 2, 2020
    Applicant: Allstate Insurance Company
    Inventors: Jason Park, John Parkinson, Mark D. Hansen, Nicolette De Guia
  • Publication number: 20200092283
    Abstract: Aspects of the disclosure relate to a system and method for securely authenticating a device via token(s) and/or verification computing device(s). A verification computing device may generate a pseudorandom number or sequence. Based on the pseudorandom number or sequence, the verification computing device may select a first plurality of parameters associated with a user of a device to be authenticated. The verification computing device may transmit, to the device, the pseudorandom number or sequence, and the device may select a second plurality of parameters. The device may generate a token based on the second plurality of parameters. The device may send the token to another device, and the other device may send the token to the verification computing device. The verification computing device may authenticate the device based on the token.
    Type: Application
    Filed: September 18, 2018
    Publication date: March 19, 2020
    Inventors: John Parkinson, Jason Park, David Harris
  • Patent number: 10592661
    Abstract: In various examples, there is a computer-implemented method for providing packages for processing on a computer system. The method creates a secure connection to an enclave and retrieves a quote to verify that the enclave is genuine and that it contains a predetermined process. The predetermined process is configured to create an enclave for itself and determine that an initial state of the computer system is equivalent to a predetermined state based on a quote retrieved from a security module. The predetermined process is further configured to receive a package to be processed by the computer system and cause the processor to process the package outside of the enclave. In response to verifying the enclave, the method provides a package to be processed by the computer system.
    Type: Grant
    Filed: November 27, 2017
    Date of Patent: March 17, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Sylvan Wesley Clebsch, Marc Manuel Johannes Brockschmidt, Syed Samin Ishtiaq, Jade Ella Carla Alglave, Matthew John Parkinson, Andrew Madison Kent
  • Publication number: 20200064423
    Abstract: A magnet (7) for use in an apparatus (1) for performing magnetic resonance imaging (MRI) of a patient's head is an asymmetric magnet (7) comprising a plurality of coils (45, 46, 47) that are aligned along a cylindrical axis (29) to provide a magnetic field on the cylindrical axis (29). The magnet (7) has a patient end (23) arranged to be positioned adjacent or against a patient's shoulders with the patient's shoulders outside the magnet (7). The magnet has a recess (27) for receipt of the patient's head and extending into the magnet (7) from the patient end (23). The magnet (7) is configured to provide an imaging volume (35) that is positioned along the cylindrical axis (29) of the magnet (7) in the recess (27), and at least a major part of the imaging volume (35) has a substantially linear non-zero magnetic field gradient along the cylindrical axis (29).
    Type: Application
    Filed: February 13, 2018
    Publication date: February 27, 2020
    Inventor: Benjamin John PARKINSON
  • Publication number: 20200004510
    Abstract: A method of operating a computer according to an actor model, the method comprising: defining a plurality of actors, each taking form of a data structure comprising respective data and one or more respective functions for operating on the respective data; generating a wrapped message to be transmitted from a transmitting actor to multiple recipient actors, the wrapped message comprising at least one constituent message, a sorted list of the recipient actors, and an index indicating an entry in the list, the index initially being set to indicate the first recipient actor in the list; transmitting the wrapped message from the transmitting actor to the first recipient actor in the list; each of the recipient actors, except the last in the list, upon receiving the wrapped message, advancing the index and forwarding the wrapped message to the next actor in the list as indicated by the advanced index.
    Type: Application
    Filed: July 23, 2018
    Publication date: January 2, 2020
    Inventors: Sylvan Wesley CLEBSCH, Matthew John PARKINSON
  • Publication number: 20200004577
    Abstract: A method of running a computer program comprising concurrent threads, wherein: at any time, the program is in a current global execution phase, GEP, each thread is divided into a sequence of local execution phases, LEPs, each corresponding to a different GEP, wherein the thread is in a current LEP that cannot progress beyond the LEP corresponding to the current GEP; any of the threads is able to advance the GEP if the current LEP of all threads has reached the LEP corresponding to the current GEP; one thread comprises code to perform an internal acquire to acquire a lock on its respective LEP; and at least one other threads comprises code to perform an external release to force advancement of the current LEP of said one thread, but wherein the external release will be blocked if said thread has performed the internal acquire.
    Type: Application
    Filed: July 23, 2018
    Publication date: January 2, 2020
    Inventors: Matthew John PARKINSON, Sylvan Wesley CLEBSCH
  • Patent number: 10496534
    Abstract: A method of manual memory management is described. In response to detecting an access violation triggered by the use of an invalid reference to an object in a manual heap, a source of the access in a register or stack is identified. An updated reference for the object using stored mapping data is determined and used to replace the invalid reference in the source.
    Type: Grant
    Filed: June 15, 2017
    Date of Patent: December 3, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Dimitrios Vytiniotis, Manuel Silverio da Silva Costa, Kapil Vaswani, Matthew John Parkinson, Piyus Kumar Kedia
  • Publication number: 20190362069
    Abstract: Methods, computer-readable media, software, and apparatuses may assist a consumer in keeping track of a consumer's accounts in order to prevent unauthorized access or use of the consumer's identified accounts. Upon discovery of a consumer's accounts, the methods, computer-readable media, software, and apparatuses may determine information that may be shared, used, or transferred by the companies, institutions, or organizations for each of the discovered accounts. The determined information may be visually displayed to the consumer along with recommendations regarding digital safety.
    Type: Application
    Filed: May 22, 2018
    Publication date: November 28, 2019
    Applicant: Allstate Insurance Company
    Inventors: Jason Park, John Parkinson, Brittany Jones
  • Patent number: 10459778
    Abstract: A method of communicating messages between threads. For each thread there are defined M buckets. When a transmitting thread has a message to send, it assigns the message to the bucket numbered m=Tid_r mod M to await transmission, where Tid_r is the ID of the receiving thread. The bucket m=Tid_t mod M is the home bucket, where Tid_t is the ID of the transmitting thread. After accumulating multiple messages, a batch transmission is performed, comprising a plurality of successive phases p. Each phase comprises: i) from each bucket other than the home bucket, transmitting some or all of the messages in the bucket as a batch to one of the receiving threads of the bucket, and ii) except in the last phase, incrementing the phase p by 1, and redistributing the messages remaining in the home bucket according to m=(Tid_r/M{circumflex over (?)}p) mod M.
    Type: Grant
    Filed: July 16, 2018
    Date of Patent: October 29, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Matthew John Parkinson, Sylvan Wesley Clebsch
  • Patent number: 10421919
    Abstract: A gasifier may include a chamber wall defining a gasification chamber configured to allow gasification of feedstock material. The gasifier may also include an ash grate disposed in the gasification chamber. The gasifier may further include a rotary crusher disposed in the gasification chamber above the ash grate. The rotary crusher may include at least one crushing element. The rotary crusher may be configured to break apart, between the at least one crushing element and an opposing surface, the feedstock material responsive to rotation of the rotary crusher.
    Type: Grant
    Filed: July 2, 2015
    Date of Patent: September 24, 2019
    Assignee: PYROCORE S.A.
    Inventor: David John Parkinson
  • Publication number: 20190163898
    Abstract: In various examples, there is a computer-implemented method for providing packages for processing on a computer system. The method creates a secure connection to an enclave and retrieves a quote to verify that the enclave is genuine and that it contains a predetermined process. The predetermined process is configured to create an enclave for itself and determine that an initial state of the computer system is equivalent to a predetermined state based on a quote retrieved from a security module. The predetermined process is further configured to receive a package to be processed by the computer system and cause the processor to process the package outside of the enclave. In response to verifying the enclave, the method provides a package to be processed by the computer system.
    Type: Application
    Filed: November 27, 2017
    Publication date: May 30, 2019
    Inventors: Sylvan Wesley CLEBSCH, Marc Manuel Johannes BROCKSCHMIDT, Syed Samin ISHTIAQ, Jade Ella Carla ALGLAVE, Matthew John PARKINSON, Andrew Madison KENT
  • Publication number: 20180276120
    Abstract: A method of manual memory management is described. In response to detecting an access violation triggered by the use of an invalid reference to an object in a manual heap, a source of the access in a register or stack is identified. An updated reference for the object using stored mapping data is determined and used to replace the invalid reference in the source.
    Type: Application
    Filed: June 15, 2017
    Publication date: September 27, 2018
    Inventors: Dimitrios VYTINIOTIS, Manuel Silverio da Silva COSTA, Kapil VASWANI, Matthew John PARKINSON, Piyus Kumar KEDIA
  • Publication number: 20180253311
    Abstract: A method of manual memory management is described which comprises enabling one or more threads to access an object created in a manual heap by storing a reference to the object in thread-local state and subsequently deleting the stored reference after accessing the object. In response to abandonment of the object, an identifier for the object and a current value of either a local counter of a thread or a global counter are stored in a delete queue and all threads are prevented from storing any further references to the object in thread-local state. Deallocation of the object only occurs when all references to the object stored in thread-local state for any threads have been deleted and a current value of the local counter for the thread or the global counter has incremented to a value that is at least a pre-defined amount more than the stored value, wherein the global counter is updated using one or more local counters.
    Type: Application
    Filed: June 6, 2017
    Publication date: September 6, 2018
    Inventors: Matthew John PARKINSON, Manuel Silverio da Silva COSTA, Dimitrios VYTINIOTIS, Kapil VASWANI