Patents by Inventor Joseph Nord

Joseph Nord has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11752506
    Abstract: A reactor system has a number of stations arranged to recover mineral particles in a slurry. The system includes a hopper to receive the slurry and barren media having hydrophobic coating to attract the mineral particles. The hopper provides a mixture of barren media and slurry to a tumbler arranged to stir the mixture in order to increase the contact between the slurry and the barren media so as to allow the mineral particles to attach to the barren media to form mineral laden media. The mineral laden media are conveyed to a rinsing station where water jets are used to wash the gangue materials off the mineral laden media. The rinsed mineral laden media are mixed with a surfactant so that the mineral particles are released from the mineral laden media. High-pressure water and air jets are then used to remove remaining surfactant from the released media.
    Type: Grant
    Filed: October 6, 2021
    Date of Patent: September 12, 2023
    Assignee: CIDRA CORPORATE SERVICES, INC.
    Inventors: Mark R. Fernald, Paul J. Rothman, Paul Dolan, Kirk Johnson, Patrick Tuxbury, Sandeep Balasubramanyam, Peter A. Amelunxen, Timothy J. Bailey, Adam Jordens, Joseph Nord
  • Patent number: 11683370
    Abstract: A backend computing system may receive first data from a first computing system, where the first data may be an encrypted version of second data that has been generated at the first computing system based on a command at the first computing system. The backend computing system may identify a second computing system different than the first computing system based on a status of the second computing system, and may send the first data to the second computing system to enable the second computing system to decrypt the first data and perform a function with respect to the second data. In some embodiments, the first computing system may generate padded data by adding data to the second data, and send the padded data to the backend computing system. In some embodiments, the first computing system may send random data to the backend computing system.
    Type: Grant
    Filed: March 26, 2021
    Date of Patent: June 20, 2023
    Inventors: Joseph Nord, Chris Mayers
  • Publication number: 20220311822
    Abstract: A backend computing system may receive first data from a first computing system, where the first data may be an encrypted version of second data that has been generated at the first computing system based on a command at the first computing system. The backend computing system may identify a second computing system different than the first computing system based on a status of the second computing system, and may send the first data to the second computing system to enable the second computing system to decrypt the first data and perform a function with respect to the second data. In some embodiments, the first computing system may generate padded data by adding data to the second data, and send the padded data to the backend computing system. In some embodiments, the first computing system may send random data to the backend computing system.
    Type: Application
    Filed: March 26, 2021
    Publication date: September 29, 2022
    Inventors: Joseph Nord, Chris Mayers
  • Patent number: 11429753
    Abstract: Techniques for encrypting keyboard data prior to its being received by an operating system of an endpoint device, reducing the possibility of unencrypted keyboard data being logged by a keylogger application running on the endpoint device. The techniques employ an encryption filter communicably coupled between a keyboard and the endpoint device. The encryption filter receives unencrypted keyboard data from the keyboard, encrypts the keyboard data, and provides the encrypted keyboard data to the operating system of the endpoint device. The techniques can be employed in association with a back-end data processing center of a security standard compliant organization, which can receive the encrypted keyboard data from the endpoint device, and decrypt the keyboard data for use on a host system. In this way, access and/or storage of unencrypted keyboard data at the endpoint device can be avoided.
    Type: Grant
    Filed: September 27, 2018
    Date of Patent: August 30, 2022
    Assignee: Citrix Systems, Inc.
    Inventors: Jacob Jared Summers, Joseph Nord
  • Patent number: 11247212
    Abstract: A reactor system has a number of stations arranged to recover mineral particles in a slurry. The system includes a hopper to receive the slurry and barren media having hydrophobic coating to attract the mineral particles. The hopper provides a mixture of barren media and slurry to a tumbler arranged to stir the mixture in order to increase the contact between the slurry and the barren media so as to allow the mineral particles to attach to the barren media to form mineral laden media. The mineral laden media are conveyed to a rinsing station where water jets are used to wash the gangue materials off the mineral laden media. The rinsed mineral laden media are mixed with a surfactant so that the mineral particles are released from the mineral laden media. High-pressure water and air jets are then used to remove remaining surfactant from the released media.
    Type: Grant
    Filed: November 1, 2017
    Date of Patent: February 15, 2022
    Assignee: CIDRA CORPORATE SERVICES, INC.
    Inventors: Mark R. Fernald, Paul J. Rothman, Paul Dolan, Kirk Johnson, Patrick Tuxbury, Sandeep Balasubramanyam, Peter A. Amelunxen, Timothy J. Bailey, Adam Jordens, Joseph Nord
  • Publication number: 20220023876
    Abstract: A reactor system has a number of stations arranged to recover mineral particles in a slurry. The system includes a hopper to receive the slurry and barren media having hydrophobic coating to attract the mineral particles. The hopper provides a mixture of barren media and slurry to a tumbler arranged to stir the mixture in order to increase the contact between the slurry and the barren media so as to allow the mineral particles to attach to the barren media to form mineral laden media. The mineral laden media are conveyed to a rinsing station where water jets are used to wash the gangue materials off the mineral laden media. The rinsed mineral laden media are mixed with a surfactant so that the mineral particles are released from the mineral laden media. High-pressure water and air jets are then used to remove remaining surfactant from the released media.
    Type: Application
    Filed: October 6, 2021
    Publication date: January 27, 2022
    Inventors: Mark R. FERNALD, Paul J. ROTHMAN, Paul DOLAN, Kirk JOHNSON, Patrick TUXBURY, Sandeep BALASUBRAMANYAM, Peter A. AMELUNXEN, Timothy J. BAILEY, Adam JORDENS, Joseph NORD
  • Publication number: 20200104538
    Abstract: Techniques for encrypting keyboard data prior to its being received by an operating system of an endpoint device, reducing the possibility of unencrypted keyboard data being logged by a keylogger application running on the endpoint device. The techniques employ an encryption filter communicably coupled between a keyboard and the endpoint device. The encryption filter receives unencrypted keyboard data from the keyboard, encrypts the keyboard data, and provides the encrypted keyboard data to the operating system of the endpoint device. The techniques can be employed in association with a back-end data processing center of a security standard compliant organization, which can receive the encrypted keyboard data from the endpoint device, and decrypt the keyboard data for use on a host system. In this way, access and/or storage of unencrypted keyboard data at the endpoint device can be avoided.
    Type: Application
    Filed: September 27, 2018
    Publication date: April 2, 2020
    Inventors: Jacob Jared Summers, Joseph Nord
  • Publication number: 20190275533
    Abstract: A reactor system has a number of stations arranged to recover mineral particles in a slurry. The system includes a hopper to receive the slurry and barren media having hydrophobic coating to attract the mineral particles. The hopper provides a mixture of barren media and slurry to a tumbler arranged to stir the mixture in order to increase the contact between the slurry and the barren media so as to allow the mineral particles to attach to the barren media to form mineral laden media. The mineral laden media are conveyed to a rinsing station where water jets are used to wash the gangue materials off the mineral laden media. The rinsed mineral laden media are mixed with a surfactant so that the mineral particles are released from the mineral laden media. High-pressure water and air jets are then used to remove remaining surfactant from the released media.
    Type: Application
    Filed: November 1, 2017
    Publication date: September 12, 2019
    Inventors: Mark R. FERNALD, Paul J. ROTHMAN, Paul DOLAN, Kirk JOHNSON, Patrick TUXBURY, Sandeep BALASUBRAMANYAM, Peter A. AMELUNXEN, Timothy J. BAILEY, Adam JORDENS, Joseph NORD
  • Patent number: 10225363
    Abstract: Just in time delivery of a consistent user profile to overlapping user sessions, where a first user session issues a request for a first file of a user profile to a server agent. Upon receiving the request, the server agent retrieves the first file from a base user profile, and just in time delivers the retrieved first file to the first user session. The user, via a second user session executing simultaneously with the first user session, issues a request to the server agent for the first file and a second file of the user profile. Upon receiving the request, the server agent identifies a modified version of the first file in a provisional user profile, retrieves the modified first file from the provisional user profile and the second file from the base user profile, and just in time delivers both files to the second user session.
    Type: Grant
    Filed: August 23, 2016
    Date of Patent: March 5, 2019
    Assignee: Citrix Systems, Inc.
    Inventors: Joseph Nord, Richard Hayton
  • Patent number: 9965622
    Abstract: The present invention is directed towards systems and methods of streaming an application from a remote location to a local machine system, and using local machine system resources in executing that application. In various embodiments, services needed by a streamed application may be started with high local system privileges in their own isolation environment. These service may be started, stopped, and otherwise managed by a Service Control Manager. In order for an application to both access services that operate at high local system privileges and the network so that it can access remotely stored, streaming, information; a streaming application may rely on privileges of the user when accessing network information rather than the higher privileges of the services running in isolation.
    Type: Grant
    Filed: May 26, 2015
    Date of Patent: May 8, 2018
    Assignee: Citrix Systems, Inc.
    Inventors: Vikramjeet Sandhu, Joseph Nord
  • Patent number: 9805210
    Abstract: Encryption-based data access management may include a variety of processes. In one example, a device may transmit a user authentication request for decrypting encrypted data to a data storage server storing the encrypted data. The computing device may then receive a validation token associated with the user's authentication request, the validation token indicating that the user is authenticated to a domain. Subsequently, the computing device may transmit the validation token to a first key server different from the data storage server. Then, in response to transmitting the validation token the computing device may receive, from the first key server, a key required for decrypting the encrypted data. The device may then decrypt at least a portion of the encrypted data using the key.
    Type: Grant
    Filed: February 26, 2015
    Date of Patent: October 31, 2017
    Assignee: CITRIX SYSTEMS, INC.
    Inventors: Joseph Nord, Benjamin Elliot Tucker, Timothy Gaylor
  • Patent number: 9690954
    Abstract: Securing encrypted virtual hard disks may include a variety of processes. In one example, a virtual hard disk is created for a user and encrypted with a volume key, and the volume key placed in an administrator header. The administrator header may be encrypted with a protection key, the protection key created from a user identifier corresponding to the user, a volume identifier corresponding to the virtual hard disk, and two cryptographic secrets. The protection key may then destroyed after encrypting the administrator header and therefore, might never leave the encryption engine. The two cryptographic secrets may be stored in separate storage locations, one accessible to the user and the other accessible to administrators. Accordingly, the protection key might never transmitted or can be intercepted, and no single entity may be compromised to gain access to all of the information needed to recreate the protection key.
    Type: Grant
    Filed: September 16, 2015
    Date of Patent: June 27, 2017
    Assignee: Citrix Systems, Inc.
    Inventors: Joseph Nord, Timothy Gaylor, Benjamin Elliot Tucker
  • Publication number: 20170048350
    Abstract: Just in time delivery of a consistent user profile to overlapping user sessions, where a first user session issues a request for a first file of a user profile to a server agent. Upon receiving the request, the server agent retrieves the first file from a base user profile, and just in time delivers the retrieved first file to the first user session. The user, via a second user session executing simultaneously with the first user session, issues a request to the server agent for the first file and a second file of the user profile. Upon receiving the request, the server agent identifies a modified version of the first file in a provisional user profile, retrieves the modified first file from the provisional user profile and the second file from the base user profile, and just in time delivers both files to the second user session.
    Type: Application
    Filed: August 23, 2016
    Publication date: February 16, 2017
    Inventors: Joseph Nord, Richard Hayton
  • Patent number: 9451044
    Abstract: Just in time delivery of a consistent user profile to overlapping user sessions, where a first user session issues a request for a first file of a user profile to a server agent. Upon receiving the request, the server agent retrieves the first file from a base user profile, and just in time delivers the retrieved first file to the first user session. The user, via a second user session executing simultaneously with the first user session, issues a request to the server agent for the first file and a second file of the user profile. Upon receiving the request, the server agent identifies a modified version of the first file in a provisional user profile, retrieves the modified first file from the provisional user profile and the second file from the base user profile, and just in time delivers both files to the second user session.
    Type: Grant
    Filed: April 23, 2014
    Date of Patent: September 20, 2016
    Assignee: Citrix Systems, Inc.
    Inventors: Joseph Nord, Richard Hayton
  • Publication number: 20160004885
    Abstract: Securing encrypted virtual hard disks may include a variety of processes. In one example, a virtual hard disk is created for a user and encrypted with a volume key, and the volume key placed in an administrator header. The administrator header may be encrypted with a protection key, the protection key created from a user identifier corresponding to the user, a volume identifier corresponding to the virtual hard disk, and two cryptographic secrets. The protection key may then destroyed after encrypting the administrator header and therefore, might never leave the encryption engine. The two cryptographic secrets may be stored in separate storage locations, one accessible to the user and the other accessible to administrators. Accordingly, the protection key might never transmitted or can be intercepted, and no single entity may be compromised to gain access to all of the information needed to recreate the protection key.
    Type: Application
    Filed: September 16, 2015
    Publication date: January 7, 2016
    Inventors: Joseph Nord, Timothy Gaylor, Benjamin Elliot Tucker
  • Publication number: 20150254455
    Abstract: The present invention is directed towards systems and methods of streaming an application from a remote location to a local machine system, and using local machine system resources in executing that application. In various embodiments, services needed by a streamed application may be started with high local system privileges in their own isolation environment. These service may be started, stopped, and otherwise managed by a Service Control Manager. In order for an application to both access services that operate at high local system privileges and the network so that it can access remotely stored, streaming, information; a streaming application may rely on privileges of the user when accessing network information rather than the higher privileges of the services running in isolation.
    Type: Application
    Filed: May 26, 2015
    Publication date: September 10, 2015
    Inventors: Vikramjeet Sandhu, Joseph Nord
  • Publication number: 20150169892
    Abstract: Encryption-based data access management may include a variety of processes. In one example, a device may transmit a user authentication request for decrypting encrypted data to a data storage server storing the encrypted data. The computing device may then receive a validation token associated with the user's authentication request, the validation token indicating that the user is authenticated to a domain. Subsequently, the computing device may transmit the validation token to a first key server different from the data storage server. Then, in response to transmitting the validation token the computing device may receive, from the first key server, a key required for decrypting the encrypted data. The device may then decrypt at least a portion of the encrypted data using the key.
    Type: Application
    Filed: February 26, 2015
    Publication date: June 18, 2015
    Inventors: Joseph Nord, Benjamin Elliot Tucker, Timothy Gaylor
  • Patent number: 9055080
    Abstract: The present invention is directed towards systems and methods of streaming an application from a remote location to a local machine system, and using local machine system resources in executing that application. In various embodiments, services needed by a streamed application may be started with high local system privileges in their own isolation environment. These service may be started, stopped, and otherwise managed by a Service Control Manager. In order for an application to both access services that operate at high local system privileges and the network so that it can access remotely stored, streaming, information; a streaming application may rely on privileges of the user when accessing network information rather than the higher privileges of the services running in isolation.
    Type: Grant
    Filed: December 13, 2010
    Date of Patent: June 9, 2015
    Assignee: Citrix Systems, Inc.
    Inventors: Vikramjeet Sandhu, Joseph Nord
  • Patent number: 9049299
    Abstract: A technique manages an online meeting. The technique includes providing an audio output signal to a first client device currently participating in the online meeting. The audio output signal directs the first client device to play a particular sound (e.g., a unique tone or a unique series of tones). The technique further involves receiving an audio input signal from a second client device. The audio input signal includes the particular sound. The technique further involves identifying the second client device as being co-located with the first client device in response to the audio input signal which includes the particular sound. Such operation enables the electronic circuitry (e.g., a processing circuit of an online meeting server) to learn whether any client devices are co-located and accordingly associate multiple devices to a single user connected to the online meeting.
    Type: Grant
    Filed: October 31, 2013
    Date of Patent: June 2, 2015
    Assignee: CITRIX SYSTEMS, INC.
    Inventor: Joseph Nord
  • Publication number: 20150117626
    Abstract: A technique manages an online meeting. The technique includes providing an audio output signal to a first client device currently participating in the online meeting. The audio output signal directs the first client device to play a particular sound (e.g., a unique tone or a unique series of tones). The technique further involves receiving an audio input signal from a second client device. The audio input signal includes the particular sound. The technique further involves identifying the second client device as being co-located with the first client device in response to the audio input signal which includes the particular sound. Such operation enables the electronic circuitry (e.g., a processing circuit of an online meeting server) to learn whether any client devices are co-located and accordingly associate multiple devices to a single user connected to the online meeting.
    Type: Application
    Filed: October 31, 2013
    Publication date: April 30, 2015
    Applicant: Citrix Systems, Inc.
    Inventor: Joseph Nord