Patents by Inventor Jory Schwach

Jory Schwach has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210123784
    Abstract: Various embodiments of the present disclosure include a system for monitoring field level sensors at an oil site. The system can include a sensor node configured to monitor a characteristic associated with an oil site. The system can include a remote terminal unit, comprising a processor and memory storing non-transitory computer readable instructions, the instructions executable by the processor to receive information from the sensor node. The system can include a central computer, wherein the remote terminal unit sends the information from the sensor node to the central computer.
    Type: Application
    Filed: May 29, 2018
    Publication date: April 29, 2021
    Inventors: Jory Schwach, Rongkai Xu, Jatan Pathak, Alexander Ayala
  • Patent number: 10915313
    Abstract: Systems, methods, and apparatuses for programming and debugging electronic devices using a near field communications device are provided. One apparatus includes an electronic device (101). The electronic device can include a microcontroller (102), wherein the microcontroller includes a bootloader (104), a device memory (103), and a processor configured to execute instructions stored on the device memory. A near field communications (NFC) interface (106) can be in communication with the microcontroller. An antenna (108) can be in communication with the NFC interface and can be configured to be energized by a signal received from an external NFC device (109). An interface memory can be in communication with the NFC interface (106), wherein the interface memory is configured to store data received from the external NFC device, the data included in the signal received from the external NFC device.
    Type: Grant
    Filed: August 24, 2016
    Date of Patent: February 9, 2021
    Assignee: Andium Inc.
    Inventors: James Dooley, Jory Schwach
  • Patent number: 10789191
    Abstract: A real-time operating system (OS) for an embedded system may be configured for asynchronous handling of input and output (I/O) operations. When application code is executing, the OS may be configured to register I/O interrupts and queue I/O operations. When no application code is executing, the OS may be configured to call appropriate interrupt handlers. As result, the OS may maintain the real-time execution that may be required of applications on an embedded system while providing the flexibility and scalability offered by an operating system.
    Type: Grant
    Filed: May 30, 2019
    Date of Patent: September 29, 2020
    Assignee: Andium Inc.
    Inventors: Jory Schwach, Brian Bosak
  • Patent number: 10754956
    Abstract: A method for executing a security stack can include executing a bootloader included in a memory resource of an electronic device in response to the bootloader receiving a prompt. The method can include performing a verification function, with the bootloader, on data stored in a programmable memory included in the memory resource of the electronic device, wherein the verification function includes comparing security data stored in a configuration area of the memory resource with a signature that accompanies the data stored in the programmable memory. The method can include determining whether the security data stored in the configuration area matches the signature that accompanies the data stored in the programmable memory.
    Type: Grant
    Filed: November 17, 2016
    Date of Patent: August 25, 2020
    Assignee: Andium Inc.
    Inventors: James Dooley, Jory Schwach
  • Publication number: 20200149936
    Abstract: Various embodiments of the present disclosure include a method for event logging. The method can include receiving a first sensor signal from a first sensor via a first sensor transmitter, wherein the sensor signal is associated with a flow of oil out of an oil storage tank. The method can include receiving a second sensor signal from a second sensor via a second sensor transmitter, wherein the second sensor signal is associated with an air pump that pumps air into the oil storage tank. The method can include determining whether a leak exists in the oil tank, based on a lag between a time when the second sensor senses operation of the air pump and a time when the flow meter detects a flow of oil out of the outlet pipe.
    Type: Application
    Filed: May 29, 2018
    Publication date: May 14, 2020
    Inventors: Rongkai Xu, Jory Schwach, Matt Ball
  • Publication number: 20200033393
    Abstract: Various embodiments of the present disclosure include a method for monitoring an electrical transmission line. The method can include generating a signal with a magnetometer in response to receipt of an electrical field generated by the electrical transmission line with the magnetometer, wherein the magnetometer is included in a first node disposed at a first location located adjacent to the electrical transmission line. The method can include analyzing the signal in relation to a health status associated with the electrical transmission line. The method can include relaying the indication of the health status to a central server via a second node that is disposed at a second location located adjacent to the electrical transmission line and down the electrical transmission line.
    Type: Application
    Filed: September 28, 2017
    Publication date: January 30, 2020
    Inventors: Jory Schwach, Rongkai Xu
  • Publication number: 20190384620
    Abstract: Various embodiments of the present disclosure can include a system. The system can include a computing device. The system can further include an application programming interface in communication with the computing device. The system can further include an interactive button, comprising a processor and a non-transitory computer readable medium that includes instructions executable by the processor. In some embodiments, the instructions can be executable to establish communication between the interactive button and the computing device via the application programming interface. In some embodiments, the instructions can be executable to send an instruction to the computing device from the interactive button via the application programming interface.
    Type: Application
    Filed: January 24, 2018
    Publication date: December 19, 2019
    Inventors: Jory Schwach, Matthew Ball
  • Publication number: 20190379541
    Abstract: Methods and systems according to the present disclosure improve upon known biometric security systems by not permanently storing (e.g., for later comparison as in known systems) the actual image of the biometric characteristic. Instead, an image of a biometric identifier (e.g., retina, fingerprint, etc.) may be used to form a key which may be used to secure and provide access to data. The key may be formed, in embodiments, using a neural network and/or a random input (e.g., a vector of random characters), for example. The image of the biometric identifier may be discarded, and thus may not be vulnerable to theft. In an embodiment, the key may be used in a key-based encryption system.
    Type: Application
    Filed: December 10, 2018
    Publication date: December 12, 2019
    Inventors: Jory Schwach, Brian Bosak
  • Publication number: 20190347227
    Abstract: A real-time operating system (OS) for an embedded system may be configured for asynchronous handling of input and output (I/O) operations. When application code is executing, the OS may be configured to register I/O interrupts and queue I/O operations. When no application code is executing, the OS may be configured to call appropriate interrupt handlers. As result, the OS may maintain the real-time execution that may be required of applications on an embedded system while providing the flexibility and scalability offered by an operating system.
    Type: Application
    Filed: May 30, 2019
    Publication date: November 14, 2019
    Inventors: Jory Schwach, Brian Bosak
  • Patent number: 10324874
    Abstract: A real-time operating system (OS) for an embedded system may be configured for asynchronous handling of input and output (I/O) operations. When application code is executing, the OS may be configured to register I/O interrupts and queue I/O operations. When no application code is executing, the OS may be configured to call appropriate interrupt handlers. As result, the OS may maintain the real-time execution that may be required of applications on an embedded system while providing the flexibility and scalability offered by an operating system.
    Type: Grant
    Filed: June 30, 2017
    Date of Patent: June 18, 2019
    Inventors: Jory Schwach, Brian Bosak
  • Patent number: 10181952
    Abstract: Methods and systems according to the present disclosure improve upon known biometric security systems by not permanently storing (e.g., for later comparison as in known systems) the actual image of the biometric characteristic. Instead, an image of a biometric identifier (e.g., retina, fingerprint, etc.) may be used to form a key which may be used to secure and provide access to data. The key may be formed, in embodiments, using a neural network and/or a random input (e.g., a vector of random characters), for example. The image of the biometric identifier may be discarded, and thus may not be vulnerable to theft. In an embodiment, the key may be used in a key-based encryption system.
    Type: Grant
    Filed: November 1, 2017
    Date of Patent: January 15, 2019
    Assignee: RAPIDGPS, LLC
    Inventors: Jory Schwach, Brian Bosak
  • Publication number: 20180336352
    Abstract: A method for executing a security stack can include executing a bootloader included in a memory resource of an electronic device in response to the bootloader receiving a prompt. The method can include performing a verification function, with the bootloader, on data stored in a programmable memory included in the memory resource of the electronic device, wherein the verification function includes comparing security data stored in a configuration area of the memory resource with a signature that accompanies the data stored in the programmable memory. The method can include determining whether the security data stored in the configuration area matches the signature that accompanies the data stored in the programmable memory.
    Type: Application
    Filed: November 17, 2016
    Publication date: November 22, 2018
    Inventors: James Dooley, Jory Schwach
  • Publication number: 20180260209
    Abstract: Systems, methods, and apparatuses for programming and debugging electronic devices using a near field communications device are provided. One apparatus includes an electronic device (101). The electronic device can include a microcontroller (102), wherein the microcontroller includes a bootloader (104), a device memory (103), and a processor configured to execute instructions stored on the device memory. A near field communications (NFC) interface (106) can be in communication with the microcontroller. An antenna (108) can be in communication with the NFC interface and can be configured to be energized by a signal received from an external NFC device (109). An interface memory can be in communication with the NFC interface (106), wherein the interface memory is configured to store data received from the external NFC device, the data included in the signal received from the external NFC device.
    Type: Application
    Filed: August 24, 2016
    Publication date: September 13, 2018
    Inventors: James Dooley, Jory Schwach
  • Publication number: 20180176021
    Abstract: The methodology described herein provides a process of interaction between a Bluetooth beacon or other wireless beacon and a user-device. Embodiments of the method may allow the user-device to cryptographically verify the identity and provider of the beacon. Only if the user-device has a record of trust with the beacon provider may the beacon be considered trustworthy. The process may be automatic and may be convenient for the user who can then assess the trustworthiness of a beacon for further ad-hoc interaction without compromising the user-experience. This may be achieved without the need for a third-party, making it robust to situations where a user-device internet-connection is unavailable, unreliable or undesirable.
    Type: Application
    Filed: June 20, 2016
    Publication date: June 21, 2018
    Inventors: James Dooley, Jory Schwach
  • Publication number: 20180123798
    Abstract: Methods and systems according to the present disclosure improve upon known biometric security systems by not permanently storing (e.g., for later comparison as in known systems) the actual image of the biometric characteristic. Instead, an image of a biometric identifier (e.g., retina, fingerprint, etc.) may be used to form a key which may be used to secure and provide access to data. The key may be formed, in embodiments, using a neural network and/or a random input (e.g., a vector of random characters), for example. The image of the biometric identifier may be discarded, and thus may not be vulnerable to theft. In an embodiment, the key may be used in a key-based encryption system.
    Type: Application
    Filed: November 1, 2017
    Publication date: May 3, 2018
    Inventors: Jory Schwach, Brian Bosak
  • Publication number: 20170364462
    Abstract: A real-time operating system (OS) for an embedded system may be configured for asynchronous handling of input and output (I/O) operations. When application code is executing, the OS may be configured to register I/O interrupts and queue I/O operations. When no application code is executing, the OS may be configured to call appropriate interrupt handlers. As result, the OS may maintain the real-time execution that may be required of applications on an embedded system while providing the flexibility and scalability offered by an operating system.
    Type: Application
    Filed: June 30, 2017
    Publication date: December 21, 2017
    Inventors: Jory Schwach, Brian Bosak
  • Patent number: 9813246
    Abstract: Methods and systems according to the present disclosure improve upon known biometric security systems by not permanently storing (e.g., for later comparison as in known systems) the actual image of the biometric characteristic. Instead, an image of a biometric identifier (e.g., retina, fingerprint, etc.) may be used to form a key which may be used to secure and provide access to data. The key may be formed, in embodiments, using a neural network and/or a random input (e.g., a vector of random characters), for example. The image of the biometric identifier may be discarded, and thus may not be vulnerable to theft. In an embodiment, the key may be used in a key-based encryption system.
    Type: Grant
    Filed: October 29, 2014
    Date of Patent: November 7, 2017
    Inventors: Jory Schwach, Brian Bosak
  • Patent number: 9697150
    Abstract: A real-time operating system (OS) for an embedded system may be configured for asynchronous handling of input and output (I/O) operations. When application code is executing, the OS may be configured to register I/O interrupts and queue I/O operations. When no application code is executing, the OS may be configured to call appropriate interrupt handlers. As result, the OS may maintain the real-time execution that may be required of applications on an embedded system while providing the flexibility and scalability offered by an operating system.
    Type: Grant
    Filed: September 4, 2014
    Date of Patent: July 4, 2017
    Inventors: Jory Schwach, Brian Bosak
  • Publication number: 20160352520
    Abstract: Methods and systems according to the present disclosure improve upon known biometric security systems by not permanently storing (e.g., for later comparison as in known systems) the actual image of the biometric characteristic. Instead, an image of a biometric identifier (e.g., retina, fingerprint, etc.) may be used to form a key which may be used to secure and provide access to data. The key may be formed, in embodiments, using a neural network and/or a random input (e.g., a vector of random characters), for example. The image of the biometric identifier may be discarded, and thus may not be vulnerable to theft. In an embodiment, the key may be used in a key-based encryption system.
    Type: Application
    Filed: October 29, 2014
    Publication date: December 1, 2016
    Inventors: Jory SCHWACH, Brian BOSAK
  • Publication number: 20150067220
    Abstract: A real-time operating system (OS) for an embedded system may be configured for asynchronous handling of input and output (I/O) operations. When application code is executing, the OS may be configured to register I/O interrupts and queue I/O operations. When no application code is executing, the OS may be configured to call appropriate interrupt handlers. As result, the OS may maintain the real-time execution that may be required of applications on an embedded system while providing the flexibility and scalability offered by an operating system.
    Type: Application
    Filed: September 4, 2014
    Publication date: March 5, 2015
    Inventors: Jory Schwach, Brian Bosak