Patents by Inventor Joseph Duffy

Joseph Duffy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11966900
    Abstract: A transaction record is created showing a purchase transaction of a customer. A CV profile showing a list of items in the transaction obtained from images is also obtained. The items in the transaction record are compared to items on the list. When there is a discrepancy, an action to take is determined.
    Type: Grant
    Filed: July 16, 2020
    Date of Patent: April 23, 2024
    Assignee: Walmart Apollo, LLC
    Inventors: Zhichun Xiao, Lingfeng Zhang, Jon Hammer, Joseph Duffy, Yao Liu, Sicong Fang, Xiang Yao, Pingyuan Wang, Yu Tao, Tianyi Mao, Yutao Tang, Feiyun Zhu, Han Zhang, Chunmei Wang, Pingjian Yu, Muzzammil Afroz, Haining Liu
  • Publication number: 20240100296
    Abstract: A package for a medical device such as an intermittent catheter has a case and a cap connected by threads. The case includes a hollow tube which is closed at one end and open at the other. A shoulder is formed near one end of the case. Above the shoulder is a cylindrical ferrule that includes external threads. The cap has internal threads selectably engageable with the threads on the ferrule to form a liquid-tight seal between the cap and case when the cap is installed on the case.
    Type: Application
    Filed: December 5, 2023
    Publication date: March 28, 2024
    Inventors: Daniel E. O'Brien, Vincent Naughton, Martin McMenamin, Joseph N. Hanley, David A. Knauz, Martin P. Creaven, Stephen Collum, Jeanne E. Lee, Siobhan Duffy, Marine Veronique Germaine Richard, Eugene Canavan, Daniel A. March
  • Publication number: 20220343668
    Abstract: In some embodiments, apparatuses and methods are provided herein useful to detecting inbound and outbound traffic. In some embodiments, there is provided a system for detecting inbound and outbound traffic at a facility including a video camera and a control circuit configured to detect a human and estimate a location of the human; determine whether the detected human is inbound or outbound the facility based on a relative movement of the detected human within a first region, a second region, and a third region; and transmit data based on the determination.
    Type: Application
    Filed: July 11, 2022
    Publication date: October 27, 2022
    Inventors: Yi Ding, Joseph Duffy, Jiankun Liu, Tianyi Mao, Ryan B. Reagan, Zhichun Xiao, Jinhan Zhang, Shouyi Zhang
  • Publication number: 20220178343
    Abstract: A towing apparatus has a spine with multiple generally parallel spine members extending in a longitudinal direction and having a length of at least 100 m, and with a leading end and a trailing end. A series of blades are mounted to the spine by couplers which allow the blade to rotate about an axis substantially transverse to the longitudinal direction, each blade having a first surface facing generally in the trailing end direction and a second surface facing generally in the leading end direction. Restraints prevent rotation of each blade by more than a pre-set amount towards the leading end, so that impingement of a wave on the first surface applies a force to the apparatus in the leading end direction. A pair of the towing apparatus' may be arranged to connect to a floating collector with a beach shape to collect floating debris on the sea surface, ridges helping to retain the debris on the slope until it is washed up into a channel.
    Type: Application
    Filed: March 20, 2020
    Publication date: June 9, 2022
    Applicant: JOSPA LIMITED
    Inventors: Jocelyn Raymond FITZSIMONS, Patrick Joseph DUFFY, Cyril KERR
  • Patent number: 11139968
    Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.
    Type: Grant
    Filed: January 3, 2020
    Date of Patent: October 5, 2021
    Assignee: International Business Machines Corporation
    Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
  • Patent number: 10903995
    Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.
    Type: Grant
    Filed: May 16, 2019
    Date of Patent: January 26, 2021
    Assignee: International Business Machines Corporation
    Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
  • Publication number: 20210019725
    Abstract: A transaction record is created showing a purchase transaction of a customer. A CV profile showing a list of items in the transaction obtained from images is also obtained. The items in the transaction record are compared to items on the list. When there is a discrepancy, an action to take is determined.
    Type: Application
    Filed: July 16, 2020
    Publication date: January 21, 2021
    Inventors: Zhichun Xiao, Lingfeng Zhang, Jon Hammer, Joseph Duffy, Yao Liu, Sicong Fang, Xiang Yao, Pingyuan Wang, Yu Tao, Tianyi Mao, Yutao Tang, Feiyun Zhu, Han Zhang, Chunmei Wang, Pingjian Yu, Muzzammil Afroz, Haining Liu
  • Patent number: 10867058
    Abstract: A method to enforce compliance with multiple-person-control rules in a secure-computing system to protect against the insider threat. The method can be patched onto an existing secure computer systems to provide granular control of any type of resource request. Existing user-user access controls are configured to prevent users from gaining unfettered access. Tasks requiring higher privilege, such as system administration, are performed under the present method of multiple-person controls, using digital signatures of resource requests to provide a separate layer of protection. A script running with sufficient privilege executes resource requests requiring privilege elevation, but only after validating a first digital signature signed by a requester and validating one or more additional digital signatures signed by reviewers. To detect playback attacks, a nonce can be included in the signed message and compared with nonce values from previously processed resource requests.
    Type: Grant
    Filed: December 29, 2017
    Date of Patent: December 15, 2020
    Inventors: Niall Joseph Duffy, Jeffery Alan Anderson
  • Publication number: 20200380252
    Abstract: In some embodiments, apparatuses and methods are provided herein useful to detecting egress. In some embodiments, there is provided a system for detecting egress at an entrance including a video camera; a computer; a network; and a control circuit configured to receive live video footage; detect a human and estimate a location of the human; track a location and movement of a detected human; determine that the detected human has moved from a first region to a second region and to a third region; and transmit an alert message that indicates that the human has exited the retail facility through the entrance area. In some embodiments, the systems and methods may be configured to comply with privacy requirements which may vary between jurisdictions. For example, before any recording, collection, capturing or processing of user images (e.g., video image, video footage, etc.), a “consent to capture” process may be implemented.
    Type: Application
    Filed: May 29, 2020
    Publication date: December 3, 2020
    Inventors: Yi Ding, Joseph Duffy, Jiankun Liu, Tianyi Mao, Ryan B. Reagan, Zhichun Xiao, Jinhan Zhang, Shouyi Zhang
  • Publication number: 20200269013
    Abstract: A tubular sheath for enclosing an expandable balloon attached to the distal portion of a catheter encloses and protects the expandable balloon. The tubular sheath is configured to be slidable and removable from the catheter. The tubular sheath may include a longitudinal splitting element that is removable as a result of a force applied to the longitudinal splitting element. The longitudinal splitting element is configured to split the wall of the tubular sheath in response to the force. Alternatively, the tubular sheath may include a gripping portion that has relatively poor cohesive strength to adjacent portions of the tubular sheath. The tubular sheath is configured to be removable in response to a force applied to the gripping portion.
    Type: Application
    Filed: May 13, 2020
    Publication date: August 27, 2020
    Inventors: John Wilson Traxler, Michael Baldwin, Joseph Duffy, John Kantor, Tony Le, Asim Malik, Susan Peterson, Emily Schoenhoff, Eric Hallberg, Steven Holt, Erik Svensson, Ronan Cleary, Sameer Singh, Steven Holmgren, Janet Komatsu, Traci Colgan, Gregory Hopper, Marcel Fuhrer
  • Patent number: 10702673
    Abstract: A tubular sheath for enclosing an expandable balloon attached to the distal portion of a catheter encloses and protects the expandable balloon. The tubular sheath is configured to be slidable and removable from the catheter. The tubular sheath may include a longitudinal splitting element that is removable as a result of a force applied to the longitudinal splitting element. The longitudinal splitting element is configured to split the wall of the tubular sheath in response to the force. Alternatively, the tubular sheath may include a gripping portion that has relatively poor cohesive strength to adjacent portions of the tubular sheath. The tubular sheath is configured to be removable in response to a force applied to the gripping portion.
    Type: Grant
    Filed: January 19, 2018
    Date of Patent: July 7, 2020
    Assignee: MEDTRONIC VASCULAR, INC.
    Inventors: John Wilson Traxler, Michael Baldwin, Joseph Duffy, John Kantor, Tony Le, Asim Malik, Susan Peterson, Emily Schoenhoff, Eric Hallberg, Steven Holt, Erik Svensson, Ronan Cleary, Sameer Singh, Steven Holmgren, Janet Komatsu, Traci Colgan, Gregory Hopper, Marcel Fuhrer
  • Publication number: 20200162250
    Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.
    Type: Application
    Filed: January 3, 2020
    Publication date: May 21, 2020
    Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
  • Patent number: 10592471
    Abstract: A computer-implemented method of a database statement for a relational database. The database comprises one or more tables comprising one or more data rows. A database statement is received. A set of predicates from the database statement and a set of data rows from the tables to use to generate the result of the database statement are determined. A set of interdiction statements applicable to one or more data rows is obtained. For each predicate, a set of masks applicable to one or more data rows is obtained, where for each mask, the data masked by the mask is used by the predicate. It is determined if a data row has an applicable interdiction statement, and contains data masked by a mask. If so, the result of the database statement without using the result of applying the predicate to the data row.
    Type: Grant
    Filed: November 23, 2015
    Date of Patent: March 17, 2020
    Assignee: International Business Machines Corporation
    Inventors: Pedro M. Barbas, Joseph Duffy, Lei Pan, David M. Tilson
  • Patent number: 10554403
    Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.
    Type: Grant
    Filed: May 15, 2019
    Date of Patent: February 4, 2020
    Assignee: International Business Machines Corporation
    Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
  • Publication number: 20190305947
    Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.
    Type: Application
    Filed: May 16, 2019
    Publication date: October 3, 2019
    Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
  • Publication number: 20190305946
    Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.
    Type: Application
    Filed: May 15, 2019
    Publication date: October 3, 2019
    Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
  • Publication number: 20190305948
    Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.
    Type: Application
    Filed: May 17, 2019
    Publication date: October 3, 2019
    Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
  • Patent number: 10408187
    Abstract: A wave energy converter has blades (54, 56, 57, 59) on frames (51, 52) rotating about a pivot joint (53) on a structure (4, 52, 502, 505, 86). There is reciprocating rotary motion of the frame with respect to the structure, providing reciprocating rotary input power to a mechanism (73, 94, 98). The mechanism (98) may be arranged so that the reciprocating input power is transferred to uni-directional power via pulleys (101, 106) and sprag clutches (102, 107).
    Type: Grant
    Filed: August 9, 2016
    Date of Patent: September 10, 2019
    Assignee: JOSPA LIMITED
    Inventors: Patrick Joseph Duffy, Jocelyn Raymond Fitzsimons
  • Publication number: 20190224449
    Abstract: A tubular sheath for enclosing an expandable balloon attached to the distal portion of a catheter encloses and protects the expandable balloon. The tubular sheath is configured to be slidable and removable from the catheter. The tubular sheath may include a longitudinal splitting element that is removable as a result of a force applied to the longitudinal splitting element. The longitudinal splitting element is configured to split the wall of the tubular sheath in response to the force. Alternatively, the tubular sheath may include a gripping portion that has relatively poor cohesive strength to adjacent portions of the tubular sheath. The tubular sheath is configured to be removable in response to a force applied to the gripping portion.
    Type: Application
    Filed: January 19, 2018
    Publication date: July 25, 2019
    Inventors: John Wilson Traxler, Michael Baldwin, Joseph Duffy, John Kantor, Tony Le, Asim Malik, Susan Peterson, Emily Schoenhoff, Eric Hallberg, Steven Holt, Erik Svensson, Ronan Cleary, Sameer Singh, Steven Holmgren, Janet Komatsu, Traci Colgan, Gregory Hopper, Marcel Fuhrer
  • Publication number: 20190205555
    Abstract: A method to enforce compliance with multiple-person-control rules in a secure-computing system to protect against the insider threat. The method can be patched onto an existing secure computer systems to provide granular control of any type of resource request. Existing user-user access controls are configured to prevent users from gaining unfettered access. Tasks requiring higher privilege, such as system administration, are performed under the present method of multiple-person controls, using digital signatures of resource requests to provide a separate layer of protection. A script running with sufficient privilege executes resource requests requiring privilege elevation, but only after validating a first digital signature signed by a requester and validating one or more additional digital signatures signed by reviewers. To detect playback attacks, a nonce can be included in the signed message and compared with nonce values from previously processed resource requests.
    Type: Application
    Filed: December 29, 2017
    Publication date: July 4, 2019
    Inventors: Niall Joseph Duffy, Jeffery Alan Anderson