Patents by Inventor Joseph Duffy
Joseph Duffy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11966900Abstract: A transaction record is created showing a purchase transaction of a customer. A CV profile showing a list of items in the transaction obtained from images is also obtained. The items in the transaction record are compared to items on the list. When there is a discrepancy, an action to take is determined.Type: GrantFiled: July 16, 2020Date of Patent: April 23, 2024Assignee: Walmart Apollo, LLCInventors: Zhichun Xiao, Lingfeng Zhang, Jon Hammer, Joseph Duffy, Yao Liu, Sicong Fang, Xiang Yao, Pingyuan Wang, Yu Tao, Tianyi Mao, Yutao Tang, Feiyun Zhu, Han Zhang, Chunmei Wang, Pingjian Yu, Muzzammil Afroz, Haining Liu
-
Publication number: 20240100296Abstract: A package for a medical device such as an intermittent catheter has a case and a cap connected by threads. The case includes a hollow tube which is closed at one end and open at the other. A shoulder is formed near one end of the case. Above the shoulder is a cylindrical ferrule that includes external threads. The cap has internal threads selectably engageable with the threads on the ferrule to form a liquid-tight seal between the cap and case when the cap is installed on the case.Type: ApplicationFiled: December 5, 2023Publication date: March 28, 2024Inventors: Daniel E. O'Brien, Vincent Naughton, Martin McMenamin, Joseph N. Hanley, David A. Knauz, Martin P. Creaven, Stephen Collum, Jeanne E. Lee, Siobhan Duffy, Marine Veronique Germaine Richard, Eugene Canavan, Daniel A. March
-
Publication number: 20220343668Abstract: In some embodiments, apparatuses and methods are provided herein useful to detecting inbound and outbound traffic. In some embodiments, there is provided a system for detecting inbound and outbound traffic at a facility including a video camera and a control circuit configured to detect a human and estimate a location of the human; determine whether the detected human is inbound or outbound the facility based on a relative movement of the detected human within a first region, a second region, and a third region; and transmit data based on the determination.Type: ApplicationFiled: July 11, 2022Publication date: October 27, 2022Inventors: Yi Ding, Joseph Duffy, Jiankun Liu, Tianyi Mao, Ryan B. Reagan, Zhichun Xiao, Jinhan Zhang, Shouyi Zhang
-
Publication number: 20220178343Abstract: A towing apparatus has a spine with multiple generally parallel spine members extending in a longitudinal direction and having a length of at least 100 m, and with a leading end and a trailing end. A series of blades are mounted to the spine by couplers which allow the blade to rotate about an axis substantially transverse to the longitudinal direction, each blade having a first surface facing generally in the trailing end direction and a second surface facing generally in the leading end direction. Restraints prevent rotation of each blade by more than a pre-set amount towards the leading end, so that impingement of a wave on the first surface applies a force to the apparatus in the leading end direction. A pair of the towing apparatus' may be arranged to connect to a floating collector with a beach shape to collect floating debris on the sea surface, ridges helping to retain the debris on the slope until it is washed up into a channel.Type: ApplicationFiled: March 20, 2020Publication date: June 9, 2022Applicant: JOSPA LIMITEDInventors: Jocelyn Raymond FITZSIMONS, Patrick Joseph DUFFY, Cyril KERR
-
Patent number: 11139968Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.Type: GrantFiled: January 3, 2020Date of Patent: October 5, 2021Assignee: International Business Machines CorporationInventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
-
Patent number: 10903995Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.Type: GrantFiled: May 16, 2019Date of Patent: January 26, 2021Assignee: International Business Machines CorporationInventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
-
Publication number: 20210019725Abstract: A transaction record is created showing a purchase transaction of a customer. A CV profile showing a list of items in the transaction obtained from images is also obtained. The items in the transaction record are compared to items on the list. When there is a discrepancy, an action to take is determined.Type: ApplicationFiled: July 16, 2020Publication date: January 21, 2021Inventors: Zhichun Xiao, Lingfeng Zhang, Jon Hammer, Joseph Duffy, Yao Liu, Sicong Fang, Xiang Yao, Pingyuan Wang, Yu Tao, Tianyi Mao, Yutao Tang, Feiyun Zhu, Han Zhang, Chunmei Wang, Pingjian Yu, Muzzammil Afroz, Haining Liu
-
Patent number: 10867058Abstract: A method to enforce compliance with multiple-person-control rules in a secure-computing system to protect against the insider threat. The method can be patched onto an existing secure computer systems to provide granular control of any type of resource request. Existing user-user access controls are configured to prevent users from gaining unfettered access. Tasks requiring higher privilege, such as system administration, are performed under the present method of multiple-person controls, using digital signatures of resource requests to provide a separate layer of protection. A script running with sufficient privilege executes resource requests requiring privilege elevation, but only after validating a first digital signature signed by a requester and validating one or more additional digital signatures signed by reviewers. To detect playback attacks, a nonce can be included in the signed message and compared with nonce values from previously processed resource requests.Type: GrantFiled: December 29, 2017Date of Patent: December 15, 2020Inventors: Niall Joseph Duffy, Jeffery Alan Anderson
-
Publication number: 20200380252Abstract: In some embodiments, apparatuses and methods are provided herein useful to detecting egress. In some embodiments, there is provided a system for detecting egress at an entrance including a video camera; a computer; a network; and a control circuit configured to receive live video footage; detect a human and estimate a location of the human; track a location and movement of a detected human; determine that the detected human has moved from a first region to a second region and to a third region; and transmit an alert message that indicates that the human has exited the retail facility through the entrance area. In some embodiments, the systems and methods may be configured to comply with privacy requirements which may vary between jurisdictions. For example, before any recording, collection, capturing or processing of user images (e.g., video image, video footage, etc.), a “consent to capture” process may be implemented.Type: ApplicationFiled: May 29, 2020Publication date: December 3, 2020Inventors: Yi Ding, Joseph Duffy, Jiankun Liu, Tianyi Mao, Ryan B. Reagan, Zhichun Xiao, Jinhan Zhang, Shouyi Zhang
-
Publication number: 20200269013Abstract: A tubular sheath for enclosing an expandable balloon attached to the distal portion of a catheter encloses and protects the expandable balloon. The tubular sheath is configured to be slidable and removable from the catheter. The tubular sheath may include a longitudinal splitting element that is removable as a result of a force applied to the longitudinal splitting element. The longitudinal splitting element is configured to split the wall of the tubular sheath in response to the force. Alternatively, the tubular sheath may include a gripping portion that has relatively poor cohesive strength to adjacent portions of the tubular sheath. The tubular sheath is configured to be removable in response to a force applied to the gripping portion.Type: ApplicationFiled: May 13, 2020Publication date: August 27, 2020Inventors: John Wilson Traxler, Michael Baldwin, Joseph Duffy, John Kantor, Tony Le, Asim Malik, Susan Peterson, Emily Schoenhoff, Eric Hallberg, Steven Holt, Erik Svensson, Ronan Cleary, Sameer Singh, Steven Holmgren, Janet Komatsu, Traci Colgan, Gregory Hopper, Marcel Fuhrer
-
Patent number: 10702673Abstract: A tubular sheath for enclosing an expandable balloon attached to the distal portion of a catheter encloses and protects the expandable balloon. The tubular sheath is configured to be slidable and removable from the catheter. The tubular sheath may include a longitudinal splitting element that is removable as a result of a force applied to the longitudinal splitting element. The longitudinal splitting element is configured to split the wall of the tubular sheath in response to the force. Alternatively, the tubular sheath may include a gripping portion that has relatively poor cohesive strength to adjacent portions of the tubular sheath. The tubular sheath is configured to be removable in response to a force applied to the gripping portion.Type: GrantFiled: January 19, 2018Date of Patent: July 7, 2020Assignee: MEDTRONIC VASCULAR, INC.Inventors: John Wilson Traxler, Michael Baldwin, Joseph Duffy, John Kantor, Tony Le, Asim Malik, Susan Peterson, Emily Schoenhoff, Eric Hallberg, Steven Holt, Erik Svensson, Ronan Cleary, Sameer Singh, Steven Holmgren, Janet Komatsu, Traci Colgan, Gregory Hopper, Marcel Fuhrer
-
Publication number: 20200162250Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.Type: ApplicationFiled: January 3, 2020Publication date: May 21, 2020Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
-
Patent number: 10592471Abstract: A computer-implemented method of a database statement for a relational database. The database comprises one or more tables comprising one or more data rows. A database statement is received. A set of predicates from the database statement and a set of data rows from the tables to use to generate the result of the database statement are determined. A set of interdiction statements applicable to one or more data rows is obtained. For each predicate, a set of masks applicable to one or more data rows is obtained, where for each mask, the data masked by the mask is used by the predicate. It is determined if a data row has an applicable interdiction statement, and contains data masked by a mask. If so, the result of the database statement without using the result of applying the predicate to the data row.Type: GrantFiled: November 23, 2015Date of Patent: March 17, 2020Assignee: International Business Machines CorporationInventors: Pedro M. Barbas, Joseph Duffy, Lei Pan, David M. Tilson
-
Patent number: 10554403Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.Type: GrantFiled: May 15, 2019Date of Patent: February 4, 2020Assignee: International Business Machines CorporationInventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
-
Publication number: 20190305947Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.Type: ApplicationFiled: May 16, 2019Publication date: October 3, 2019Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
-
Publication number: 20190305946Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.Type: ApplicationFiled: May 15, 2019Publication date: October 3, 2019Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
-
Publication number: 20190305948Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.Type: ApplicationFiled: May 17, 2019Publication date: October 3, 2019Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
-
Patent number: 10408187Abstract: A wave energy converter has blades (54, 56, 57, 59) on frames (51, 52) rotating about a pivot joint (53) on a structure (4, 52, 502, 505, 86). There is reciprocating rotary motion of the frame with respect to the structure, providing reciprocating rotary input power to a mechanism (73, 94, 98). The mechanism (98) may be arranged so that the reciprocating input power is transferred to uni-directional power via pulleys (101, 106) and sprag clutches (102, 107).Type: GrantFiled: August 9, 2016Date of Patent: September 10, 2019Assignee: JOSPA LIMITEDInventors: Patrick Joseph Duffy, Jocelyn Raymond Fitzsimons
-
Publication number: 20190224449Abstract: A tubular sheath for enclosing an expandable balloon attached to the distal portion of a catheter encloses and protects the expandable balloon. The tubular sheath is configured to be slidable and removable from the catheter. The tubular sheath may include a longitudinal splitting element that is removable as a result of a force applied to the longitudinal splitting element. The longitudinal splitting element is configured to split the wall of the tubular sheath in response to the force. Alternatively, the tubular sheath may include a gripping portion that has relatively poor cohesive strength to adjacent portions of the tubular sheath. The tubular sheath is configured to be removable in response to a force applied to the gripping portion.Type: ApplicationFiled: January 19, 2018Publication date: July 25, 2019Inventors: John Wilson Traxler, Michael Baldwin, Joseph Duffy, John Kantor, Tony Le, Asim Malik, Susan Peterson, Emily Schoenhoff, Eric Hallberg, Steven Holt, Erik Svensson, Ronan Cleary, Sameer Singh, Steven Holmgren, Janet Komatsu, Traci Colgan, Gregory Hopper, Marcel Fuhrer
-
Publication number: 20190205555Abstract: A method to enforce compliance with multiple-person-control rules in a secure-computing system to protect against the insider threat. The method can be patched onto an existing secure computer systems to provide granular control of any type of resource request. Existing user-user access controls are configured to prevent users from gaining unfettered access. Tasks requiring higher privilege, such as system administration, are performed under the present method of multiple-person controls, using digital signatures of resource requests to provide a separate layer of protection. A script running with sufficient privilege executes resource requests requiring privilege elevation, but only after validating a first digital signature signed by a requester and validating one or more additional digital signatures signed by reviewers. To detect playback attacks, a nonce can be included in the signed message and compared with nonce values from previously processed resource requests.Type: ApplicationFiled: December 29, 2017Publication date: July 4, 2019Inventors: Niall Joseph Duffy, Jeffery Alan Anderson