Patents by Inventor Jory Schwach
Jory Schwach has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210123784Abstract: Various embodiments of the present disclosure include a system for monitoring field level sensors at an oil site. The system can include a sensor node configured to monitor a characteristic associated with an oil site. The system can include a remote terminal unit, comprising a processor and memory storing non-transitory computer readable instructions, the instructions executable by the processor to receive information from the sensor node. The system can include a central computer, wherein the remote terminal unit sends the information from the sensor node to the central computer.Type: ApplicationFiled: May 29, 2018Publication date: April 29, 2021Inventors: Jory Schwach, Rongkai Xu, Jatan Pathak, Alexander Ayala
-
Patent number: 10915313Abstract: Systems, methods, and apparatuses for programming and debugging electronic devices using a near field communications device are provided. One apparatus includes an electronic device (101). The electronic device can include a microcontroller (102), wherein the microcontroller includes a bootloader (104), a device memory (103), and a processor configured to execute instructions stored on the device memory. A near field communications (NFC) interface (106) can be in communication with the microcontroller. An antenna (108) can be in communication with the NFC interface and can be configured to be energized by a signal received from an external NFC device (109). An interface memory can be in communication with the NFC interface (106), wherein the interface memory is configured to store data received from the external NFC device, the data included in the signal received from the external NFC device.Type: GrantFiled: August 24, 2016Date of Patent: February 9, 2021Assignee: Andium Inc.Inventors: James Dooley, Jory Schwach
-
Patent number: 10789191Abstract: A real-time operating system (OS) for an embedded system may be configured for asynchronous handling of input and output (I/O) operations. When application code is executing, the OS may be configured to register I/O interrupts and queue I/O operations. When no application code is executing, the OS may be configured to call appropriate interrupt handlers. As result, the OS may maintain the real-time execution that may be required of applications on an embedded system while providing the flexibility and scalability offered by an operating system.Type: GrantFiled: May 30, 2019Date of Patent: September 29, 2020Assignee: Andium Inc.Inventors: Jory Schwach, Brian Bosak
-
Patent number: 10754956Abstract: A method for executing a security stack can include executing a bootloader included in a memory resource of an electronic device in response to the bootloader receiving a prompt. The method can include performing a verification function, with the bootloader, on data stored in a programmable memory included in the memory resource of the electronic device, wherein the verification function includes comparing security data stored in a configuration area of the memory resource with a signature that accompanies the data stored in the programmable memory. The method can include determining whether the security data stored in the configuration area matches the signature that accompanies the data stored in the programmable memory.Type: GrantFiled: November 17, 2016Date of Patent: August 25, 2020Assignee: Andium Inc.Inventors: James Dooley, Jory Schwach
-
Publication number: 20200149936Abstract: Various embodiments of the present disclosure include a method for event logging. The method can include receiving a first sensor signal from a first sensor via a first sensor transmitter, wherein the sensor signal is associated with a flow of oil out of an oil storage tank. The method can include receiving a second sensor signal from a second sensor via a second sensor transmitter, wherein the second sensor signal is associated with an air pump that pumps air into the oil storage tank. The method can include determining whether a leak exists in the oil tank, based on a lag between a time when the second sensor senses operation of the air pump and a time when the flow meter detects a flow of oil out of the outlet pipe.Type: ApplicationFiled: May 29, 2018Publication date: May 14, 2020Inventors: Rongkai Xu, Jory Schwach, Matt Ball
-
Publication number: 20200033393Abstract: Various embodiments of the present disclosure include a method for monitoring an electrical transmission line. The method can include generating a signal with a magnetometer in response to receipt of an electrical field generated by the electrical transmission line with the magnetometer, wherein the magnetometer is included in a first node disposed at a first location located adjacent to the electrical transmission line. The method can include analyzing the signal in relation to a health status associated with the electrical transmission line. The method can include relaying the indication of the health status to a central server via a second node that is disposed at a second location located adjacent to the electrical transmission line and down the electrical transmission line.Type: ApplicationFiled: September 28, 2017Publication date: January 30, 2020Inventors: Jory Schwach, Rongkai Xu
-
Publication number: 20190384620Abstract: Various embodiments of the present disclosure can include a system. The system can include a computing device. The system can further include an application programming interface in communication with the computing device. The system can further include an interactive button, comprising a processor and a non-transitory computer readable medium that includes instructions executable by the processor. In some embodiments, the instructions can be executable to establish communication between the interactive button and the computing device via the application programming interface. In some embodiments, the instructions can be executable to send an instruction to the computing device from the interactive button via the application programming interface.Type: ApplicationFiled: January 24, 2018Publication date: December 19, 2019Inventors: Jory Schwach, Matthew Ball
-
Publication number: 20190379541Abstract: Methods and systems according to the present disclosure improve upon known biometric security systems by not permanently storing (e.g., for later comparison as in known systems) the actual image of the biometric characteristic. Instead, an image of a biometric identifier (e.g., retina, fingerprint, etc.) may be used to form a key which may be used to secure and provide access to data. The key may be formed, in embodiments, using a neural network and/or a random input (e.g., a vector of random characters), for example. The image of the biometric identifier may be discarded, and thus may not be vulnerable to theft. In an embodiment, the key may be used in a key-based encryption system.Type: ApplicationFiled: December 10, 2018Publication date: December 12, 2019Inventors: Jory Schwach, Brian Bosak
-
Publication number: 20190347227Abstract: A real-time operating system (OS) for an embedded system may be configured for asynchronous handling of input and output (I/O) operations. When application code is executing, the OS may be configured to register I/O interrupts and queue I/O operations. When no application code is executing, the OS may be configured to call appropriate interrupt handlers. As result, the OS may maintain the real-time execution that may be required of applications on an embedded system while providing the flexibility and scalability offered by an operating system.Type: ApplicationFiled: May 30, 2019Publication date: November 14, 2019Inventors: Jory Schwach, Brian Bosak
-
Patent number: 10324874Abstract: A real-time operating system (OS) for an embedded system may be configured for asynchronous handling of input and output (I/O) operations. When application code is executing, the OS may be configured to register I/O interrupts and queue I/O operations. When no application code is executing, the OS may be configured to call appropriate interrupt handlers. As result, the OS may maintain the real-time execution that may be required of applications on an embedded system while providing the flexibility and scalability offered by an operating system.Type: GrantFiled: June 30, 2017Date of Patent: June 18, 2019Inventors: Jory Schwach, Brian Bosak
-
Patent number: 10181952Abstract: Methods and systems according to the present disclosure improve upon known biometric security systems by not permanently storing (e.g., for later comparison as in known systems) the actual image of the biometric characteristic. Instead, an image of a biometric identifier (e.g., retina, fingerprint, etc.) may be used to form a key which may be used to secure and provide access to data. The key may be formed, in embodiments, using a neural network and/or a random input (e.g., a vector of random characters), for example. The image of the biometric identifier may be discarded, and thus may not be vulnerable to theft. In an embodiment, the key may be used in a key-based encryption system.Type: GrantFiled: November 1, 2017Date of Patent: January 15, 2019Assignee: RAPIDGPS, LLCInventors: Jory Schwach, Brian Bosak
-
Publication number: 20180336352Abstract: A method for executing a security stack can include executing a bootloader included in a memory resource of an electronic device in response to the bootloader receiving a prompt. The method can include performing a verification function, with the bootloader, on data stored in a programmable memory included in the memory resource of the electronic device, wherein the verification function includes comparing security data stored in a configuration area of the memory resource with a signature that accompanies the data stored in the programmable memory. The method can include determining whether the security data stored in the configuration area matches the signature that accompanies the data stored in the programmable memory.Type: ApplicationFiled: November 17, 2016Publication date: November 22, 2018Inventors: James Dooley, Jory Schwach
-
Publication number: 20180260209Abstract: Systems, methods, and apparatuses for programming and debugging electronic devices using a near field communications device are provided. One apparatus includes an electronic device (101). The electronic device can include a microcontroller (102), wherein the microcontroller includes a bootloader (104), a device memory (103), and a processor configured to execute instructions stored on the device memory. A near field communications (NFC) interface (106) can be in communication with the microcontroller. An antenna (108) can be in communication with the NFC interface and can be configured to be energized by a signal received from an external NFC device (109). An interface memory can be in communication with the NFC interface (106), wherein the interface memory is configured to store data received from the external NFC device, the data included in the signal received from the external NFC device.Type: ApplicationFiled: August 24, 2016Publication date: September 13, 2018Inventors: James Dooley, Jory Schwach
-
Publication number: 20180176021Abstract: The methodology described herein provides a process of interaction between a Bluetooth beacon or other wireless beacon and a user-device. Embodiments of the method may allow the user-device to cryptographically verify the identity and provider of the beacon. Only if the user-device has a record of trust with the beacon provider may the beacon be considered trustworthy. The process may be automatic and may be convenient for the user who can then assess the trustworthiness of a beacon for further ad-hoc interaction without compromising the user-experience. This may be achieved without the need for a third-party, making it robust to situations where a user-device internet-connection is unavailable, unreliable or undesirable.Type: ApplicationFiled: June 20, 2016Publication date: June 21, 2018Inventors: James Dooley, Jory Schwach
-
Publication number: 20180123798Abstract: Methods and systems according to the present disclosure improve upon known biometric security systems by not permanently storing (e.g., for later comparison as in known systems) the actual image of the biometric characteristic. Instead, an image of a biometric identifier (e.g., retina, fingerprint, etc.) may be used to form a key which may be used to secure and provide access to data. The key may be formed, in embodiments, using a neural network and/or a random input (e.g., a vector of random characters), for example. The image of the biometric identifier may be discarded, and thus may not be vulnerable to theft. In an embodiment, the key may be used in a key-based encryption system.Type: ApplicationFiled: November 1, 2017Publication date: May 3, 2018Inventors: Jory Schwach, Brian Bosak
-
Publication number: 20170364462Abstract: A real-time operating system (OS) for an embedded system may be configured for asynchronous handling of input and output (I/O) operations. When application code is executing, the OS may be configured to register I/O interrupts and queue I/O operations. When no application code is executing, the OS may be configured to call appropriate interrupt handlers. As result, the OS may maintain the real-time execution that may be required of applications on an embedded system while providing the flexibility and scalability offered by an operating system.Type: ApplicationFiled: June 30, 2017Publication date: December 21, 2017Inventors: Jory Schwach, Brian Bosak
-
Patent number: 9813246Abstract: Methods and systems according to the present disclosure improve upon known biometric security systems by not permanently storing (e.g., for later comparison as in known systems) the actual image of the biometric characteristic. Instead, an image of a biometric identifier (e.g., retina, fingerprint, etc.) may be used to form a key which may be used to secure and provide access to data. The key may be formed, in embodiments, using a neural network and/or a random input (e.g., a vector of random characters), for example. The image of the biometric identifier may be discarded, and thus may not be vulnerable to theft. In an embodiment, the key may be used in a key-based encryption system.Type: GrantFiled: October 29, 2014Date of Patent: November 7, 2017Inventors: Jory Schwach, Brian Bosak
-
Patent number: 9697150Abstract: A real-time operating system (OS) for an embedded system may be configured for asynchronous handling of input and output (I/O) operations. When application code is executing, the OS may be configured to register I/O interrupts and queue I/O operations. When no application code is executing, the OS may be configured to call appropriate interrupt handlers. As result, the OS may maintain the real-time execution that may be required of applications on an embedded system while providing the flexibility and scalability offered by an operating system.Type: GrantFiled: September 4, 2014Date of Patent: July 4, 2017Inventors: Jory Schwach, Brian Bosak
-
Publication number: 20160352520Abstract: Methods and systems according to the present disclosure improve upon known biometric security systems by not permanently storing (e.g., for later comparison as in known systems) the actual image of the biometric characteristic. Instead, an image of a biometric identifier (e.g., retina, fingerprint, etc.) may be used to form a key which may be used to secure and provide access to data. The key may be formed, in embodiments, using a neural network and/or a random input (e.g., a vector of random characters), for example. The image of the biometric identifier may be discarded, and thus may not be vulnerable to theft. In an embodiment, the key may be used in a key-based encryption system.Type: ApplicationFiled: October 29, 2014Publication date: December 1, 2016Inventors: Jory SCHWACH, Brian BOSAK
-
Publication number: 20150067220Abstract: A real-time operating system (OS) for an embedded system may be configured for asynchronous handling of input and output (I/O) operations. When application code is executing, the OS may be configured to register I/O interrupts and queue I/O operations. When no application code is executing, the OS may be configured to call appropriate interrupt handlers. As result, the OS may maintain the real-time execution that may be required of applications on an embedded system while providing the flexibility and scalability offered by an operating system.Type: ApplicationFiled: September 4, 2014Publication date: March 5, 2015Inventors: Jory Schwach, Brian Bosak