Patents by Inventor Jonathan TATE

Jonathan TATE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220272107
    Abstract: A computer implemented method to block malware propagation in a network of computer systems, each computer system in the network having associated location information indicating a physical location, by receiving, for each of a plurality of time periods, a model of the network of computer systems identifying communications therebetween and a malware infection state of each computer system; identifying a physical location at which one or more computer systems are involved in propagation of the malware, the identification being based on changes to malware infection states of computer systems; colocation of computer systems and the communications therebetween identified in the models; and implementing protective measures in respect to the physical location so as to block propagation of the malware through the network.
    Type: Application
    Filed: June 24, 2020
    Publication date: August 25, 2022
    Inventors: Xiao-Si WANG, Zhan cui, Jonathan TATE
  • Publication number: 20220247759
    Abstract: A computer implemented method to block malware propagation in a network of computer systems by receiving, for each of a plurality of time periods, a model of the network of computer systems identifying communications therebetween and a malware infection state of each computer system; identifying a common resource in the network involved in propagation of the malware, the identification being based on changes to malware infection states of computer systems and the communications therebetween identified in the models; and implementing protective measures in respect to the common resource so as to block propagation of the malware through the network.
    Type: Application
    Filed: June 24, 2020
    Publication date: August 4, 2022
    Inventors: Xiao-Si WANG, Zhan cui, Jonathan TATE
  • Publication number: 20220239671
    Abstract: A computer implemented method to block malware propagation in a network of computer systems by receiving, for each of a plurality of time periods, a historical model of the network of computer systems identifying communications therebetween and a malware infection state of each computer system; generating, for each of a plurality of subsequent time periods, a forecast model of the network of computer systems in which each forecast model identifies communications between computer systems and malware infection state of computer systems being determined based on an extrapolation of the set of historical models; identifying a common resource in the network involved in propagation of the malware, the identification being based on changes to malware infection states of computer systems and the communications therebetween identified in the forecast models; and implementing protective measures in respect to the common resource so as to block propagation of the malware through the network.
    Type: Application
    Filed: June 24, 2020
    Publication date: July 28, 2022
    Inventors: Xiao-Si WANG, Zhan cui, Jonathan TATE
  • Publication number: 20210271484
    Abstract: The invention provides a method of initiating code including (i) storing an application having first, second and third functions, the first function being a main function that calls the second and third functions to run the application, (ii) compiling the application to first and second heterogeneous processors to create first and second central processing unit (CPU) instruction set architecture (ISA) objects respectively, (iii) pruning the first and second CPU ISA objects by removing the third function from the first CPU ISA objects and removing first and second functions from the second CPU ISA objects;, (iv) proxy inserting first and second remote procedure calls (RPC's) in the first and second CPU ISA objects respectively, and pointing respectively to the third function in the second CPU ISA objects and the second function in the first CPU ISA objects, and (v) section renaming the second CPU ISA objects to common application library.
    Type: Application
    Filed: July 10, 2019
    Publication date: September 2, 2021
    Applicant: Magic Leap, Inc.
    Inventors: Jonathan Tate LINDSEY, Gregory Michael LINK
  • Publication number: 20210029123
    Abstract: A computer implemented method of controlling access to a digital asset specifying how an artefact is to be rendered, the method including receiving the digital asset and an indication of a first transaction in a decentralized sequential transactional database; verifying the digital asset by evaluating a digital hash of the asset to compare with a hash stored in the first transaction and, responsive to the verification, securely storing the digital asset; generating a second transaction in the database to indicate the availability of the digital asset for rendering the artefact; receiving a request to access the digital asset by a requesting renderer, the request including an indication of a third transaction in the database; accessing the third transaction and responsive to a determination that the third transaction indicates that the requesting renderer is authorized to access the digital asset for rendering the artefact, securely communicating the digital asset to the requesting renderer.
    Type: Application
    Filed: November 20, 2018
    Publication date: January 28, 2021
    Inventors: Iain MONTEATH, Joshua DANIEL, Jonathan TATE