Patents by Inventor Joshua DANIEL

Joshua DANIEL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11866226
    Abstract: A foldably constructed pallet includes a top member forming a top surface of the foldably constructed pallet and a bottom member forming a bottom surface of the foldably constructed pallet. The bottom member includes, extending from the bottom surface, a plurality of outer sidewalls, and a plurality of internal sidewalls. An outer sidewall of the plurality of outer sidewalls and an internal sidewall of the plurality of internal sidewalls cooperate to define a cradle configured to hold a structural insert such that folded panels of the structural insert may be engaged with each of the outer sidewall and the internal sidewall. The top member may be connected to the bottom member and covering the cradle.
    Type: Grant
    Filed: January 19, 2022
    Date of Patent: January 9, 2024
    Assignee: GREEN OX PALLET TECHNOLOGY, LLC
    Inventors: Joshua Daniel Herbeck, Gregory D. Van De Mark
  • Patent number: 11853427
    Abstract: In some embodiments, a processor can receive an input string associated with a potentially malicious artifact and convert each character in the input string into a vector of values to define a character matrix. The processor can apply a convolution matrix to a first window of the character matrix to define a first subscore, apply the convolution matrix to a second window of the character matrix to define a second sub score and combine the first subscore and the second subscore to define a score for the convolution matrix. The processor can provide the score for the convolution matrix as an input to a machine learning threat model, identify the potentially malicious artifact as malicious based on an output of the machine learning threat model, and perform a remedial action on the potentially malicious artifact based on identifying the potentially malicious artifact as malicious.
    Type: Grant
    Filed: December 19, 2022
    Date of Patent: December 26, 2023
    Assignee: Invincea, Inc.
    Inventor: Joshua Daniel Saxe
  • Patent number: 11848081
    Abstract: Systems and methods are disclosed for monitoring models for bias. In one implementation, a system for automatically assessing a deployed model for selection of a cohort may include a processing device programmed to: apply the deployed model to data representing a first plurality of individuals, the data including at least one characteristic of the first plurality of individuals; based on the application, select a subset of the first plurality of individuals as a cohort; receive data representing a second plurality of individuals labeled as within the cohort, the data including the at least one characteristic of the second plurality of individuals; compare the selected subset and the second plurality of individuals along the at least one characteristic; and determine whether the comparison results in a difference between the selected subset and the second plurality of individuals greater than a threshold.
    Type: Grant
    Filed: May 6, 2019
    Date of Patent: December 19, 2023
    Assignee: Flatiron Health, Inc.
    Inventors: Benjamin Edward Birnbaum, Joshua Daniel Haimson, Lucy Dao-Ke He, Melissa Hedberg, Nathan Coleman Nussbaum, Paul Stephen Richardson, Katharina Nicola Seidl-Rathkopf, Evan Eino Estola, Peter Daniel Larson
  • Publication number: 20230403286
    Abstract: A potentially malicious command including a plurality of features is received. Additionally, a plurality of nodes included in a decision tree are traversed, based on the plurality of features, to identify a leaf node included in the plurality of nodes. The leaf node is associated with (1) a first set of similar commands, each similar command from the first set of similar commands including the plurality of features, and (2) a second set of similar commands from the first set of similar commands and that were previously detected. Additionally, a probability that the potentially malicious command will be escalated as potentially malicious is determined based on the first set of similar commands and the second set of similar commands. Additionally, a first indication quantifying the first set of similar commands, a second indication quantifying the second set of similar commands, and the probability are caused to be displayed.
    Type: Application
    Filed: May 17, 2022
    Publication date: December 14, 2023
    Inventor: Joshua Daniel SAXE
  • Patent number: 11841947
    Abstract: Apparatus and methods describe herein, for example, a process that can include receiving a potentially malicious file, and dividing the potentially malicious file into a set of byte windows. The process can include calculating at least one attribute associated with each byte window from the set of byte windows for the potentially malicious file. In such an instance, the at least one attribute is not dependent on an order of bytes in the potentially malicious file. The process can further include identifying a probability that the potentially malicious file is malicious, based at least in part on the at least one attribute and a trained threat model.
    Type: Grant
    Filed: December 8, 2020
    Date of Patent: December 12, 2023
    Assignee: Invincea, Inc.
    Inventors: Joshua Daniel Saxe, Konstantin Berlin
  • Patent number: 11829257
    Abstract: Due to the threat of virus attacks and ransom ware, an apparatus and methods for protecting backup storage devices from malicious software virus attacks is explored. An independent backup storage system is connected to a primary storage server over an undiscoverable communications line. The backup storage system is a read-only backup storage system most of the time buffering the backup storage system from a virus or attack on the primary storage server. The backup storage system changes from a read-only backup storage system to a read/write backup storage system only during a backup window of time where data is backed up to the backup storage system. A snapshot of the backup data is maintained in the backup storage system and can be made available at numerous points of time in the past if the data primary storage server becomes corrupted.
    Type: Grant
    Filed: May 18, 2023
    Date of Patent: November 28, 2023
    Assignee: Spectra Logic Corporation
    Inventors: David Lee Trachy, Joshua Daniel Carter
  • Patent number: 11822374
    Abstract: An apparatus for detecting malicious files includes a memory and a processor communicatively coupled to the memory. The processor receives multiple potentially malicious files. A first potentially malicious file has a first file format, and a second potentially malicious file has a second file format different than the first file format. The processor extracts a first set of strings from the first potentially malicious file, and extracts a second set of strings from the second potentially malicious file. First and second feature vectors are defined based on lengths of each string from the associated set of strings. The processor provides the first feature vector as an input to a machine learning model to produce a maliciousness classification of the first potentially malicious file, and provides the second feature vector as an input to the machine learning model to produce a maliciousness classification of the second potentially malicious file.
    Type: Grant
    Filed: May 7, 2021
    Date of Patent: November 21, 2023
    Assignee: Sophos Limited
    Inventors: Joshua Daniel Saxe, Ethan M. Rudd, Richard Harang
  • Publication number: 20230360731
    Abstract: Systems and methods for interactive pathogen detection are described including receiving at least one target genome file and at least one near-neighbor genome file and analyzing the target genome file and the near-neighbor genome file to generate a plurality of raw e-probes unique to a target pathogen. Each raw e-probe includes a unique nucleic acid signature sequence selected from along a length of the pathogen genome of the target pathogen. The plurality of raw e-probes are curated to provide a curated e-probe set. The curated e-probe set can be in silico validated and/or in vitro validated. The resulting e-probe set can be used to determine presence of the target pathogen in a sample metagenome in an e-probe diagnostic system.
    Type: Application
    Filed: April 12, 2023
    Publication date: November 9, 2023
    Inventors: Kitty Frances Cardwell, Andres Sebastian Espindola Camacho, Tyler Dang, Joshua Daniel Habiger, Huizi Wang
  • Publication number: 20230315722
    Abstract: In some embodiments, a processor receives, via an interface, natural language data associated with a user request for performing an identified computational task associated with a cybersecurity management system. The processor is configured to provide the natural language data as input to a machine learning (ML) model. The ML model is configured to automatically infer a template query based on the natural language data. The processor is further configured to cause the template query to be displayed, via the interface. The processor is further configured to receive, via the interface, user input indicating a finalized query associated with the identified computational task, and to provide the finalized query as input to a system configured to perform the identified computational task. The processor is further configured to modify a security setting in the cybersecurity management system based on the performance of the identified computational task.
    Type: Application
    Filed: March 31, 2022
    Publication date: October 5, 2023
    Inventors: Joshua Daniel SAXE, Younghoo LEE
  • Publication number: 20230315856
    Abstract: In some embodiments, a processor receives natural language data for performing an identified cybersecurity task. The processor can provide the natural language data to a first machine learning (ML) model. The first ML model can automatically infer a template query based on the natural language data. The processor can receive user input indicating a finalized query and to provide the finalized query as input to a system configured to perform the identified computational task. The processor can provide the finalized query as a reference phrase to a second ML model, the second ML model configured to generate a set of natural language phrases similar to the reference phrase. The processor can generate supplemental training data using the set of natural language phrases similar to the reference phrase to augment training data used to improve performance of the first ML model and/or the second ML model.
    Type: Application
    Filed: March 31, 2022
    Publication date: October 5, 2023
    Inventors: Younghoo LEE, Miklós Sándor BÉKY, Joshua Daniel SAXE
  • Publication number: 20230316005
    Abstract: In one or more embodiments, a command is repeatedly input a predetermined number of times into a machine learning model to generate a plurality of different natural language (NL) descriptions. The plurality of different NL descriptions are input into the machine learning model to generate a plurality of different check commands. A plurality of similarity metrics are determined by comparing each check command from the plurality of different check commands to the command. A check command from the plurality of different check commands that is most similar to the command is identified based on the plurality of similarity metrics. An NL description from the plurality of different NL descriptions is caused to be displayed, the NL description previously input into the machine learning model to generate the check command.
    Type: Application
    Filed: March 31, 2022
    Publication date: October 5, 2023
    Inventor: Joshua Daniel SAXE
  • Patent number: 11771378
    Abstract: Systems and methods for quantifying the duration of S1 and/or S2 heart sounds, in order to identify markers of heart failure and/or lung failure, are provided. Cardiac cycles containing S1 and S2 sound can be identified in a phonocardiogram and normalized. In order to quantify S1 and S2 sound length, the envelope of the absolute value of the signal can be obtained for each cycle. The sound waves of two components can be separated using the identified single sound wave. These features can be correlated to measures of heart failure and/or lung failure.
    Type: Grant
    Filed: December 29, 2022
    Date of Patent: October 3, 2023
    Assignee: THE FLORIDA INTERNATIONAL UNIVERSITY BOARD OF TRUSTEES
    Inventors: Valentina Dargam, Joshua Daniel Hutcheson
  • Publication number: 20230289265
    Abstract: Due to the threat of virus attacks and ransom ware, an apparatus and methods for protecting backup storage devices from malicious software virus attacks is explored. An independent backup storage system is connected to a primary storage server over an undiscoverable communications line. The backup storage system is a read-only backup storage system most of the time buffering the backup storage system from a virus or attack on the primary storage server. The backup storage system changes from a read-only backup storage system to a read/write backup storage system only during a backup window of time where data is backed up to the backup storage system. A snapshot of the backup data is maintained in the backup storage system and can be made available at numerous points of time in the past if the data primary storage server becomes corrupted.
    Type: Application
    Filed: May 18, 2023
    Publication date: September 14, 2023
    Inventors: David Lee Trachy, Joshua Daniel Carter
  • Patent number: 11755974
    Abstract: An automated system attempts to characterize code as safe or unsafe. For intermediate code samples not placed with sufficient confidence in either category, human-readable analysis is automatically generated to assist a human reviewer in reaching a final disposition. For example, a random forest over human-interpretable features may be created and used to identify suspicious features in a manner that is understandable to, and actionable by, a human reviewer. Similarly, a k-nearest neighbor algorithm may be used to identify similar samples of known safe and unsafe code based on a model for, e.g., a file path, a URL, an executable, and so forth. Similar code may then be displayed (with other information) to a user for evaluation in a user interface. This comparative information can improve the speed and accuracy of human interventions by providing richer context for human review of potential threats.
    Type: Grant
    Filed: March 1, 2021
    Date of Patent: September 12, 2023
    Assignee: Sophos Limited
    Inventors: Joshua Daniel Saxe, Andrew J. Thomas, Russell Humphries, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy
  • Patent number: 11734601
    Abstract: Systems and methods are disclosed for selecting cohorts. In one implementation, a model-assisted selection system for identifying candidates for placement into a cohort includes a data interface and at least one processing device. The at least one processing device is programmed to access, via the data interface, a database from which feature vectors associated with an individual from among a population of individuals can be derived; derive, for the individual, one or more feature vectors from the database; provide the one or more feature vectors to a model; receive an output from the model; and determine whether the individual from among the population of individuals is a candidate for the cohort based on the output received from the model.
    Type: Grant
    Filed: May 3, 2019
    Date of Patent: August 22, 2023
    Assignee: Flatiron Health, Inc.
    Inventors: Benjamin Edward Birnbaum, Joshua Daniel Haimson, Lucy Dao-Ke He, Katharina Nicola Seidl-Rathkopf, Monica Nayan Agrawal, Nathan Nussbaum
  • Publication number: 20230229772
    Abstract: In some embodiments, a method includes processing at least a portion of a received file into a first set of fragments and analyzing each fragment from the first set of fragments using a machine learning model to identify within each fragment first information potentially relevant to whether the file is malicious. The method includes forming a second set of fragments by combining adjacent fragments from the first set of fragments and analyzing each fragment from the second set of fragments using the machine learning model to identify second information potentially relevant to whether the file is malicious. The method includes identifying the file as malicious based on the first information within at least one fragment from the first set of fragments and the second information within at least one fragment from the second set of fragments. The method includes performing a remedial action based on identifying the file as malicious.
    Type: Application
    Filed: March 20, 2023
    Publication date: July 20, 2023
    Applicant: Sophos Limited
    Inventors: Joshua Daniel SAXE, Richard HARANG
  • Patent number: 11703338
    Abstract: A system includes a processor configured to receive requirement values, from a vehicle-providing entity, for a plurality of predefined tunable routing parameters. The processor is also configured to select and assign entity-associated, routing parameter consideration-levels, based on the values correlated to a predefined schema of consideration-levels for each parameter. The processor is further configured to receive a plurality of pick-up requests and determine, using the entity-associated routing parameter consideration-levels, a routing-plan for a plurality of vehicles to service the requests such that the received values are met.
    Type: Grant
    Filed: November 19, 2020
    Date of Patent: July 18, 2023
    Assignee: Ford Global Technologies, LLC
    Inventors: Huizhu Crystal Wang, Joshua Daniel Lyon, Mohammad Abouali, Qianyi Wang
  • Publication number: 20230210469
    Abstract: Systems and methods for quantifying the duration of S1 and/or S2 heart sounds, in order to identify markers of heart failure and/or lung failure, are provided. Cardiac cycles containing S1 and S2 sound can be identified in a phonocardiogram and normalized. In order to quantify S1 and S2 sound length, the envelope of the absolute value of the signal can be obtained for each cycle. The sound waves of two components can be separated using the identified single sound wave. These features can be correlated to measures of heart failure and/or lung failure.
    Type: Application
    Filed: December 29, 2022
    Publication date: July 6, 2023
    Applicant: The Florida International University Board of Trustees
    Inventors: Valentina Dargam, Joshua Daniel Hutcheson
  • Patent number: 11694777
    Abstract: Systems and methods are disclosed for monitoring models for bias. In one implementation, a system for automatically assessing a deployed model for selection of a cohort may include a processing device programmed to: apply the deployed model to data representing a first plurality of individuals, the data including at least one characteristic of the first plurality of individuals; based on the application, select a subset of the first plurality of individuals as a cohort; receive data representing a second plurality of individuals labeled as within the cohort, the data including the at least one characteristic of the second plurality of individuals; compare the selected subset and the second plurality of individuals along the at least one characteristic; and determine whether the comparison results in a difference between the selected subset and the second plurality of individuals greater than a threshold.
    Type: Grant
    Filed: October 5, 2018
    Date of Patent: July 4, 2023
    Assignee: Flatiron Health, Inc.
    Inventors: Benjamin Edward Birnbaum, Joshua Daniel Haimson, Lucy Dao-Ke He, Melissa Hedberg, Nathan Coleman Nussbaum, Paul Stephen Richardson, Katharina Nicola Seidl-Rathkopf, Evan Eino Estola, Peter Daniel Larson
  • Patent number: D1003307
    Type: Grant
    Filed: October 30, 2020
    Date of Patent: October 31, 2023
    Assignee: Embecta Corp.
    Inventors: Joshua Daniel Coyle, Danielle Victoria Butler, Ryan Francis Bedell, Brett Lawrence Martin, David Downey, Linda Charlite-Ruiz