Patents by Inventor John Sinclair

John Sinclair has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11918790
    Abstract: A drug injection device includes a last dose setting having a main drive pin, a drive wheel, a driven wheel, an abutment element fixedly coupled to, or integrally formed with, the driven wheel. The drive wheel has a rotation axis parallel to a longitudinal axis and is configured to be driven about the longitudinal axis by a knob and to be periodically driven in rotation about the rotation axis by the main drive pin, during a drug dose setting. The driven wheel has a second rotation axis parallel or coaxial to said longitudinal axis and is configured to be periodically driven about the longitudinal axis by the drive wheel. The abutment element is configured to prevent the rotation of the drive wheel about the longitudinal axis when the knob has made a predetermined number of full and/or partial rotations about the longitudinal axis correlated to the predetermined drug volume.
    Type: Grant
    Filed: December 21, 2022
    Date of Patent: March 5, 2024
    Assignee: Stevanato Group S.P.A.
    Inventors: Oliver Taylor Harvey, Christopher John Hurlstone, Isobel Rachel Sands, Rhona Ann Sinclair
  • Publication number: 20220324947
    Abstract: The invention relates to the use of a single heavy chain variable domain antibody against human cytomegalovirus protein US28, which antibody binds to the extracellular region including, for example, the N-terminal extracellular region and/or the extracellular loops of US28, for isolation of cells that are infected with cytomegalovirus and/or for ex vivo reactivation of cytomegalovirus in latently infected cells. The invention further relates to the anti-US28 antibody for use in a method of reactivating cytomegalovirus in infected cells, or in a method of eliminating infected cells. The invention further relates to a tissue, organ, or cells such as bone marrow stem cells, from which cells that were infected with CMV have been removed with the use of the anti-US28 antibody.
    Type: Application
    Filed: August 5, 2020
    Publication date: October 13, 2022
    Inventors: Martine Joyce Smit, Timo Werner Marcella De Groof, Raimond Heukers, John Sinclair, Elizabeth Elder
  • Patent number: 11248447
    Abstract: A carriage arranged to walk along an elongate member while carrying a payload includes individually-operable clamps that are spaced axially along a common longitudinal axis. An axially-extensible frame connects the clamps. At least one of the clamps is attached to the frame via a rotationally-displaceable coupling for relative angular movement between that clamp and the frame about the longitudinal axis. The carriage can carry the payload to a subsea worksite by opening and closing the clamps to release and grip the elongate member in a sequence that includes moving the leading clamp forward when the leading clamp is open and moving the trailing clamp forward when the leading clamp is closed. At the worksite, installation force can be applied to the payload in a forward direction by moving the leading clamp forward when the leading clamp is open and the trailing clamp is closed.
    Type: Grant
    Filed: March 23, 2018
    Date of Patent: February 15, 2022
    Assignee: Subsea 7 Limited
    Inventors: Stewart John Sinclair Munro, Michael John Fowkes, Ian Adamson
  • Patent number: 10590745
    Abstract: A carriage arranged to walk along an elongate member while carrying a payload includes individually-operable clamps that are spaced axially along a common longitudinal axis. An axially-extensible frame connects the clamps. At least one of the clamps is attached to the frame via a rotationally-displaceable coupling for relative angular movement between that clamp and the frame about the longitudinal axis. The carriage can carry the payload to a subsea worksite by opening and closing the clamps to release and grip the elongate member in a sequence that includes moving the leading clamp forward when the leading clamp is open and moving the trailing clamp forward when the leading clamp is closed. At the worksite, installation force can be applied to the payload in a forward direction by moving the leading clamp forward when the leading clamp is open and the trailing clamp is closed.
    Type: Grant
    Filed: September 20, 2016
    Date of Patent: March 17, 2020
    Assignee: Subsea 7 Limited
    Inventors: Stewart John Sinclair Munro, Mick Fowkes, Ian Adamson
  • Patent number: 10574693
    Abstract: A password breach registry is utilized to secure a service provided by a service provider. The password breach registry is a publicly accessible registry and includes password tokens written by breached service providers. The password tokens indicate passwords used to access breached service providers that may have been breached. A service provider can subscribe to the password breach registry and periodically query the password breach registry to determine if a password token corresponding to a user of a service provided by the service provider has been written to the password breach registry. This may indicate that the user of the service utilizes the same password on other services that have been breached. Upon determining that the password token has been written to the password breach registry, the user can be locked out from the service to prevent a malicious actor from gaining access to the account of the user.
    Type: Grant
    Filed: March 14, 2018
    Date of Patent: February 25, 2020
    Assignee: CA TECHNOLOGIES, INC.
    Inventors: Steven Cornelis Versteeg, Nathan Allin Hastings, Xien Yao, John Sinclair Bird
  • Patent number: 10530754
    Abstract: A registry is utilized to identify personally identifiable information (PII) that has been breached. The registry is a distributed database shared by multiple organizations to track which PII has been breached in other organizations. A first service provider initially receives PII and corresponding signed descriptor from a user. The PII is used to verify an identity of the user and the signed descriptor describes the type of PII that is received. The first service provider queries the registry to determine if the signed descriptor of the user has been written to the registry by a second service provider, indicating that it has been breached at a service provided by the second service provider. If the first service provider uses the breached PII, the breached PII is invalidated by the first service provider.
    Type: Grant
    Filed: October 15, 2018
    Date of Patent: January 7, 2020
    Assignee: CA, Inc.
    Inventors: Steven Cornelis Versteeg, Nathan Allin Hastings, Xien Yao, John Sinclair Bird
  • Patent number: 10523705
    Abstract: A password breach registry is utilized to secure a service provided by a service provider. The password breach registry is a publicly accessible registry and includes password tokens written by breached service providers. The password tokens indicate passwords used to access breached service providers that may have been breached. A service provider can subscribe to the password breach registry and periodically query the password breach registry to determine if a password token corresponding to a user of a service provided by the service provider has been written to the password breach registry. This may indicate that the user of the service utilizes the same password on other services that have been breached. Upon determining that the password token has been written to the password breach registry, the user can be locked out from the service to prevent a malicious actor from gaining access to the account of the user.
    Type: Grant
    Filed: October 15, 2018
    Date of Patent: December 31, 2019
    Assignee: CA, Inc.
    Inventors: Steven Cornelis Versteeg, Nathan Allin Hastings, Xien Yao, John Sinclair Bird
  • Publication number: 20190305968
    Abstract: A method includes identifying a set of computing-resistant puzzles and receiving human-input proposed solutions to at least a subset of the puzzles. The method further includes confirming the validity of the human-input proposed solutions and producing a proof-of-work based on at least a threshold quantity of validated human-input proposed solutions. A new block including the produced proof-of-work is added to a blockchain database.
    Type: Application
    Filed: March 27, 2018
    Publication date: October 3, 2019
    Inventors: Steven Cornelis VERSTEEG, John Sinclair BIRD, Nathan Allin HASTINGS, Xien YAO, Deborah Anne VETHECAN
  • Publication number: 20190303622
    Abstract: A method includes obtaining a plurality of proof-of-stake blocks that include user data to be added to a blockchain database, and each of the proof-of-stake blocks is confirmed. In response to confirming each of the proof-of-stake blocks, each of the proof-of-stake blocks is added to the blockchain database. The method further includes obtaining a proof-of-work block that includes a representation of each of the proof-of-stake blocks added to the blockchain database and confirming the proof-of-work block. In response to confirming the proof-of-work block, the method adds the proof-of-work block to the blockchain database.
    Type: Application
    Filed: March 28, 2018
    Publication date: October 3, 2019
    Inventors: Steven Cornelis VERSTEEG, John Sinclair BIRD, Deborah Anne VETHECAN
  • Publication number: 20190296907
    Abstract: A method includes distributing a plurality of key pieces associated with an encryption key to a plurality of key piece holders, adding release data to a blockchain database including sensitive data encrypted with the encryption key and a specified release date. The method further includes providing instructions to key piece holders to add respective key pieces to the blockchain database at the specified release date to facilitate time-based release of the sensitive data.
    Type: Application
    Filed: March 23, 2018
    Publication date: September 26, 2019
    Inventors: Steven Cornelis VERSTEEG, John Sinclair BIRD, Deborah Anne VETHECAN
  • Patent number: 10284533
    Abstract: A registry is utilized to identify personally identifiable information (PII) that has been breached. The registry is a distributed database shared by multiple organizations to track which PII has been breached in other organizations. A first service provider initially receives PII and corresponding signed descriptor from a user. The PII is used to verify an identity of the user and the signed descriptor describes the type of PII that is received. The first service provider queries the registry to determine if the signed descriptor of the user has been written to the registry by a second service provider, indicating that it has been breached at a service provided by the second service provider. If the first service provider uses the breached PII, the breached PII is invalidated by the first service provider.
    Type: Grant
    Filed: March 14, 2018
    Date of Patent: May 7, 2019
    Assignee: CA, INC.
    Inventors: Steven Cornelis Versteeg, Nathan Allin Hastings, Xien Yao, John Sinclair Bird
  • Publication number: 20190052673
    Abstract: A password breach registry is utilized to secure a service provided by a service provider. The password breach registry is a publicly accessible registry and includes password tokens written by breached service providers. The password tokens indicate passwords used to access breached service providers that may have been breached. A service provider can subscribe to the password breach registry and periodically query the password breach registry to determine if a password token corresponding to a user of a service provided by the service provider has been written to the password breach registry. This may indicate that the user of the service utilizes the same password on other services that have been breached. Upon determining that the password token has been written to the password breach registry, the user can be locked out from the service to prevent a malicious actor from gaining access to the account of the user.
    Type: Application
    Filed: October 15, 2018
    Publication date: February 14, 2019
    Inventors: STEVEN CORNELIS VERSTEEG, NATHAN ALLIN HASTINGS, XIEN YAO, JOHN SINCLAIR BIRD
  • Publication number: 20190052614
    Abstract: A registry is utilized to identify personally identifiable information (PII) that has been breached. The registry is a distributed database shared by multiple organizations to track which PII has been breached in other organizations. A first service provider initially receives PII and corresponding signed descriptor from a user. The PII is used to verify an identity of the user and the signed descriptor describes the type of PII that is received. The first service provider queries the registry to determine if the signed descriptor of the user has been written to the registry by a second service provider, indicating that it has been breached at a service provided by the second service provider. If the first service provider uses the breached PII, the breached PII is invalidated by the first service provider.
    Type: Application
    Filed: October 15, 2018
    Publication date: February 14, 2019
    Inventors: STEVEN CORNELIS VERSTEEG, NATHAN ALLIN HASTINGS, XIEN YAO, JOHN SINCLAIR BIRD
  • Patent number: 10174866
    Abstract: A submersible mixing and sampling apparatus with submersible supply systems (12, 14) for first and second liquid components such as a thermoset resin and a curing agent is disclosed. Each supply system has a respective submersible tank (24) for holding a respective one of the liquid components. Submersible mixers (46, 48, 50) downstream of the supply systems mix the liquid components underwater to form a curable mixture for injection into a subsea chamber such as a tee (102). Submersible sampling devices downstream of the mixers take samples (94) of the mixture underwater before, during and after injection, and optionally also at the surface. The samples may be cured and tested underwater or may be lifted to the surface for testing. The apparatus may be mounted on a subsea skid (100) or basket.
    Type: Grant
    Filed: September 10, 2015
    Date of Patent: January 8, 2019
    Assignee: Subsea 7 Limited
    Inventors: Mick Fowkes, Paul Booth, Dan Quoc Vu, Stewart John Sinclair Munro, Catriona Rachel Ogg
  • Patent number: 10089384
    Abstract: In a computer-implemented method for endpoint management, a plurality of messages communicated between a target endpoint and a client are recorded, in a computer-readable memory. Ones of the messages are clustered into respective groups, where the respective groups correspond to respective operation types of the ones of the messages included therein. For the respective operation types, respective message structures used by the target endpoint are determined based on commonalities among the ones of the messages of the respective groups corresponding to the operation types. For one of the respective operation types, a request to the target endpoint is generated in accordance with a corresponding one of the respective message structures used by the target endpoint. Related computer systems and computer program products are also discussed.
    Type: Grant
    Filed: March 12, 2015
    Date of Patent: October 2, 2018
    Assignee: CA, INC.
    Inventors: Nathan Allin Hastings, Steven Cornelis Versteeg, John Sinclair Bird, Xien Yao
  • Publication number: 20180274332
    Abstract: A carriage arranged to walk along an elongate member while carrying a payload includes individually-operable clamps that are spaced axially along a common longitudinal axis. An axially-extensible frame connects the clamps. At least one of the clamps is attached to the frame via a rotationally-displaceable coupling for relative angular movement between that clamp and the frame about the longitudinal axis. The carriage can carry the payload to a subsea worksite by opening and closing the clamps to release and grip the elongate member in a sequence that includes moving the leading clamp forward when the leading clamp is open and moving the trailing clamp forward when the leading clamp is closed. At the worksite, installation force can be applied to the payload in a forward direction by moving the leading clamp forward when the leading clamp is open and the trailing clamp is closed.
    Type: Application
    Filed: September 20, 2016
    Publication date: September 27, 2018
    Inventors: Stewart John Sinclair Munro, Mick Fowkes, Ian Adamson
  • Patent number: 10084762
    Abstract: A registry is utilized to identify personally identifiable information (PII) that has been breached. The registry is a distributed database shared by multiple organizations to track which PII has been breached in other organizations. A first service provider initially receives PII and corresponding signed descriptor from a user. The PII is used to verify an identity of the user and the signed descriptor describes the type of PII that is received. The first service provider queries the registry to determine if the signed descriptor of the user has been written to the registry by a second service provider, indicating that it has been breached at a service provided by the second service provider. If the first service provider uses the breached PII, the breached PII is invalidated by the first service provider.
    Type: Grant
    Filed: September 1, 2016
    Date of Patent: September 25, 2018
    Assignee: CA, INC.
    Inventors: Steven Cornelis Versteeg, Nathan Allin Hastings, Xien Yao, John Sinclair Bird
  • Patent number: 10079855
    Abstract: A password breach registry is utilized to secure a service provided by a service provider. The password breach registry is a publicly accessible registry and includes password tokens written by breached service providers. The password tokens indicate passwords used to access breached service providers that may have been breached. A service provider can subscribe to the password breach registry and periodically query the password breach registry to determine if a password token corresponding to a user of a service provided by the service provider has been written to the password breach registry. This may indicate that the user of the service utilizes the same password on other services that have been breached. Upon determining that the password token has been written to the password breach registry, the user can be locked out from the service to prevent a malicious actor from gaining access to the account of the user.
    Type: Grant
    Filed: September 1, 2016
    Date of Patent: September 18, 2018
    Assignee: CA, INC.
    Inventors: Steven Cornelis Versteeg, Nathan Allin Hastings, Xien Yao, John Sinclair Bird
  • Publication number: 20180208283
    Abstract: A carriage arranged to walk along elongate member while carrying a payload includes individually-operable clamps that are spaced axially along a common longitudinal axis. An axially-extensible frame connects the clamps. At least one of the clamps is attached to the frame via a rotationally-displaceable coupling for relative angular movement between that clamp an the frame about the longitudinal axis. The carriage can carry the payload to a subsea worksite by opening and closing the clamps to release and grip the elongate member in a sequence that includes moving the leading clamp forward when the leading clamp is open and moving the trailing clamp forward when the leading clamp is closed. At the worksite, installation force can be applied to the payload in a forward direction by moving the leading clamp forward when the leading clamp is open and the trailing clamp is closed.
    Type: Application
    Filed: March 23, 2018
    Publication date: July 26, 2018
    Inventors: Stewart John Sinclair Munro, Mick Fowkes, Ian Adamson
  • Publication number: 20180205712
    Abstract: A registry is utilized to identify personally identifiable information (PII) that has been breached. The registry is a distributed database shared by multiple organizations to track which PII has been breached in other organizations. A first service provider initially receives PII and corresponding signed descriptor from a user. The PII is used to verify an identity of the user and the signed descriptor describes the type of PII that is received. The first service provider queries the registry to determine if the signed descriptor of the user has been written to the registry by a second service provider, indicating that it has been breached at a service provided by the second service provider. If the first service provider uses the breached PII, the breached PII is invalidated by the first service provider.
    Type: Application
    Filed: March 14, 2018
    Publication date: July 19, 2018
    Inventors: STEVEN CORNELIS VERSTEEG, NATHAN ALLIN HASTINGS, XIEN YAO, JOHN SINCLAIR BIRD