Patents by Inventor Joshua DANIEL

Joshua DANIEL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230070107
    Abstract: Articles and methods for archival raised image printing is disclosed. The process includes modifying an electronic image, printing the image on a paper substrate to form a printed substrate, applying the printed substrate onto a barrier substrate via an applicator such that the applicator creates a wall around the outer edge of the image, coating the printed substrate with a varnish composition, and drying the printed substrate in a humidity controlled environment. This configuration provides an efficient system of archival printing to print raised images on an article.
    Type: Application
    Filed: August 17, 2022
    Publication date: March 9, 2023
    Inventor: Joshua Daniel NADEAU
  • Patent number: 11586751
    Abstract: A computer implemented method for access control for a restricted resource in a computer system, the method including receiving a first set of records for the computer system, each record detailing an occurrence in the computer system during a training time period when the resource is accessed in an approved manner; generating a sparse distributed representation of the set of records to form a training set for a hierarchical temporal memory (HTM); training the HTM based on the training set in order that the trained HTM provides a model of the operation of the computer system during the training time period; receiving a second set of records for the computer system, each record detailing an occurrence in the computer system during an operating time period for the computer system in use by a consumer of the resource; generating a sparse distributed representation of the second set of records to form an input set for the trained HTM; executing the trained HTM based on the input set to determine a degree of recog
    Type: Grant
    Filed: March 26, 2018
    Date of Patent: February 21, 2023
    Assignee: British Telecommunications Public Limited Company
    Inventors: Joshua Daniel, Xiaofeng Du
  • Patent number: 11552962
    Abstract: An ensemble of detection techniques are used to identify code that presents intermediate levels of threat. For example, an ensemble of machine learning techniques may be used to evaluate suspiciousness based on binaries, file paths, behaviors, reputations, and so forth, and code may be sorted into safe, unsafe, intermediate, or any similar categories. By filtering and prioritizing intermediate threats with these tools, human threat intervention can advantageously be directed toward code samples and associated contexts most appropriate for non-automated responses.
    Type: Grant
    Filed: September 12, 2018
    Date of Patent: January 10, 2023
    Assignee: Sophos Limited
    Inventors: Joshua Daniel Saxe, Andrew J. Thomas, Russell Humphries, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy
  • Publication number: 20230005799
    Abstract: Some embodiments include apparatuses and methods of fabricating the apparatuses. One of the apparatuses includes a substrate of a semiconductor die; a memory cell portion located over a first portion of the substrate; a conductive pad portion located over a second portion of the substrate and outside the memory cell portion; and a sensor circuit including a portion located over the second portion of the substrate and under the conductive pad portion. The conductive pad portion includes conductive pads. Each of the conductive pads is part of a respective electrical path coupled to a conductive contact of a base outside the substrate.
    Type: Application
    Filed: August 22, 2022
    Publication date: January 5, 2023
    Inventors: Chiara Cerafogli, Kenneth William Marr, Brian J. Soderling, Michael P. Violette, Joshua Daniel Tomayer, James Eric Davis
  • Patent number: 11544380
    Abstract: In some embodiments, a processor can receive an input string associated with a potentially malicious artifact and convert each character in the input string into a vector of values to define a character matrix. The processor can apply a convolution matrix to a first window of the character matrix to define a first subscore, apply the convolution matrix to a second window of the character matrix to define a second subscore and combine the first subscore and the second subscore to define a score for the convolution matrix. The processor can provide the score for the convolution matrix as an input to a machine learning threat model, identify the potentially malicious artifact as malicious based on an output of the machine learning threat model, and perform a remedial action on the potentially malicious artifact based on identifying the potentially malicious artifact as malicious.
    Type: Grant
    Filed: December 17, 2020
    Date of Patent: January 3, 2023
    Assignee: Invincea, Inc.
    Inventor: Joshua Daniel Saxe
  • Patent number: 11539701
    Abstract: A computer implemented method of a network access point for secure network access by a mobile computing device, the mobile device being associated with the access point by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, the method including receiving a request from another network access point to associate the mobile device with the other access point, the request having associated identification information for the mobile device; responsive to a verification of an entitlement of the mobile device to access the network, generating a new record for storage in the blockchain, the new record associating the mobile device with the other access point and being validated by the miner components such that the other access point provides access to the network for the mobile device based on the validation of the new record.
    Type: Grant
    Filed: June 8, 2018
    Date of Patent: December 27, 2022
    Assignee: British Telecommunications Public Limited Company
    Inventor: Joshua Daniel
  • Publication number: 20220373402
    Abstract: Self-calibrating a humidity sensor of an integrated humidity and temperature sensor, using the integrated heating element, and the temperature and humidity sensors, of the device, together with a firmware-based control loop running on a controller. The controller actively calculates and monitors one or both sensor output, and the slopes of the sensor outputs, in real time, while the heating element is on, and compares one or both slopes to a pre-programmed threshold, while in a programmable control loop, to then capture the appropriate relative humidity offset to apply to the device during normal operation (with the integrated heating element switched off) for correcting the relative humidity output from the device. Any singularly mounted in-system device can be calibrated, independent of external references, for in-system calibration.
    Type: Application
    Filed: May 18, 2022
    Publication date: November 24, 2022
    Inventor: Joshua Daniel WYATT
  • Publication number: 20220353284
    Abstract: Embodiments disclosed include methods and apparatus for detecting a reputation of infrastructure associated with potentially malicious content. In some embodiments, an apparatus includes a memory and a processor. The processor is configured to identify an Internet Protocol (IP) address associated with potentially malicious content and define each row of a matrix by applying a different subnet mask from a plurality of subnet masks to a binary representation of the IP address to define that row of the matrix. The processor is further configured to provide the matrix as an input to a machine learning model, and receive, from the machine learning model, a score associated with a maliciousness of the IP address.
    Type: Application
    Filed: April 23, 2021
    Publication date: November 3, 2022
    Applicant: Sophos Limited
    Inventors: Tamás VÖRÖS, Richard HARANG, Joshua Daniel SAXE
  • Patent number: 11488704
    Abstract: Embodiments described herein disclose technology for detecting and mitigating a health event. The system can monitor health information associated with the user. The health information can be collected by sensors. The system can assess the environment in the location of the user using one or more connected devices and/or sensors. Based on the health information and the environment, the system can detect whether a health event is occurring. In response to detecting a health event, the system can generate a mitigation plan and alter controllable environmental features according to the mitigation plan via the connected devices.
    Type: Grant
    Filed: August 19, 2019
    Date of Patent: November 1, 2022
    Assignee: United Services Automobile Association (USAA)
    Inventors: Justin Dax Haslam, Christina N. Nickel, Anthony Scott Farnsworth, David John Pflug, Kelly Q. Baker, Joshua Daniel Elkin
  • Patent number: 11489693
    Abstract: A computer implemented method of a network access point for secure network access by a mobile computing device, the mobile device being associated with the access point by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, the method including receiving a request from another network access point to associate the mobile device with the other access point, the request having associated identification information for the mobile device; responsive to a verification of an entitlement of the mobile device to access the network, generating a new record for storage in the blockchain, the new record associating the mobile device with the other access point and being validated by the miner components such that the other access point provides access to the network for the mobile device based on the validation of the new record, wherein the network access point provides access to a local network inacces
    Type: Grant
    Filed: June 8, 2018
    Date of Patent: November 1, 2022
    Inventors: Joshua Daniel, Paul Kearney
  • Patent number: 11470092
    Abstract: A computer implemented method of a first network access point to provide network access for a mobile device, the mobile device associated with a second network access point by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, wherein the mobile device has associated a quantity of cryptocurrency by a digitally signed record in the blockchain, the method including receiving a request from the mobile device to access the network; generating a first new record for storage in the blockchain to transfer a predetermined quantity of cryptocurrency associated with the requester to be associated with the first access point, the first new record being validated by the miner components; responsive to the validation of the first new record, notifying the second access point of the request of the mobile device to access the network; responsive to a validation of a second new record in the blockchain, the
    Type: Grant
    Filed: June 8, 2018
    Date of Patent: October 11, 2022
    Assignee: British Telecommunications Public Limited Company
    Inventor: Joshua Daniel
  • Patent number: 11469891
    Abstract: A computer implemented method of a receiving secure computing component to provide access to a cryptographic key for a key requester, the key being associated with an owning secure computing component by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, wherein the key requester has associated a quantity of cryptocurrency by a digitally signed record in the blockchain, the method including: receiving a request from the key requester to access the key; generating a first new record for storage in the blockchain to transfer a predetermined quantity of cryptocurrency associated with the requester to be associated with the receiving component, the first new record being validated by the miner components; responsive to the validation of the first new record, communicating a request to the owning component to transfer the key to the receiving component; responsive to securely receiving the key at
    Type: Grant
    Filed: June 11, 2018
    Date of Patent: October 11, 2022
    Assignee: British Telecommunications Public Limited Company
    Inventor: Joshua Daniel
  • Publication number: 20220318429
    Abstract: A compute instance may be configured to extract a feature of a data instance accessed by the compute instance, generate an anonymized feature value for the feature of the data instance, include the anonymized feature value in a feature vector corresponding to the data instance, and transmit the feature vector to a server-based computing system.
    Type: Application
    Filed: March 30, 2021
    Publication date: October 6, 2022
    Inventors: Joseph H. Levy, Kenneth D. Ray, Joshua Daniel Saxe
  • Publication number: 20220318665
    Abstract: A compute instance stores a programmable feature extractor associated with a machine learning model maintained by a server-based computing system configured to communicate with the compute instance by way of a network. The machine learning model is based on a feature set that includes a plurality of features. The compute instance executes the programmable feature extractor to generate a feature vector corresponding to a data instance accessed by the compute instance, where the feature vector includes a feature value specific to the data instance for each feature included in the feature set. The compute instance transmits the feature vector corresponding to the data instance to the server-based computing system for use as a training input to the machine learning model.
    Type: Application
    Filed: March 30, 2021
    Publication date: October 6, 2022
    Inventors: Joseph H. Levy, Kenneth D. Ray, Joshua Daniel Saxe
  • Patent number: 11451387
    Abstract: A computer implemented method of generating cryptographic keys for a plurality of hardware security modules (HSMs), the method including generating a plurality of cryptographic keys for use by the HSMs in providing cryptography functions, wherein the cryptographic keys are generated based on numerical data generated by a hardware random number generator; and storing the generated cryptographic keys in a secure key store, such that a key in the key store utilized by an HSM is flagged as utilized to prevent other HSMs utilizing the same key, so as to provide a rate of generation and storage of the cryptographic keys unconstrained by the resources of any HSM.
    Type: Grant
    Filed: May 2, 2019
    Date of Patent: September 20, 2022
    Assignee: BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
    Inventors: Joshua Daniel, Ali Sajjad
  • Patent number: 11424169
    Abstract: Some embodiments include apparatuses and methods of fabricating the apparatuses. One of the apparatuses includes a substrate of a semiconductor die; a memory cell portion located over a first portion of the substrate; a conductive pad portion located over a second portion of the substrate and outside the memory cell portion; and a sensor circuit including a portion located over the second portion of the substrate and under the conductive pad portion. The conductive pad portion includes conductive pads. Each of the conductive pads is part of a respective electrical path coupled to a conductive contact of a base outside the substrate.
    Type: Grant
    Filed: August 8, 2019
    Date of Patent: August 23, 2022
    Assignee: Micron Technology, Inc.
    Inventors: Chiara Cerafogli, Kenneth William Marr, Brian J. Soderling, Michael P. Violette, Joshua Daniel Tomayer, James E. Davis
  • Patent number: 11418172
    Abstract: A two-terminal electrical protective device operates by harvesting energy from a small but non-zero voltage drop across a closed solid-state switch. From a default, open-circuit state, the device is remotely triggered by an AC signal to enter the desired conductive state. Power scavenged by an energy harvesting circuit while the device is in the conductive state, powers a gate drive circuit to hold the device in the conductive state for as long as current flows. When current stops, the device returns to the default open-circuit state.
    Type: Grant
    Filed: August 14, 2019
    Date of Patent: August 16, 2022
    Assignee: Generac Power Systems, Inc.
    Inventor: Joshua Daniel Kaufman
  • Patent number: 11411726
    Abstract: A computer implemented method of generating cryptographic keys for a hardware security module (HSM), the method including generating a plurality of cryptographic keys and storing the cryptographic keys for use by the HSM in providing cryptography functions, wherein the cryptographic keys are generated based on numerical data generated by a hardware random number generator, such that a rate of generation of the cryptographic keys unconstrained by the resources of the HSM, wherein the hardware random number generator operates based on a plurality of statistically random entropy data sources originating from natural phenomena so as to increase a degree of randomness of the numerical data.
    Type: Grant
    Filed: May 2, 2019
    Date of Patent: August 9, 2022
    Assignee: BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
    Inventors: Joshua Daniel, Ali Sajjad
  • Publication number: 20220217167
    Abstract: A technique for dynamically updating a user interface for threat investigation may include receiving a scheduled transmittal of events in an event stream from an endpoint at a threat management facility, processing the event stream at the threat management facility to detect an intermediate threat, in response to detecting the intermediate threat at the threat management facility, requesting a transmittal of supplemental information from a data recorder on the endpoint, receiving the supplemental information in a supplemental transmittal from the endpoint to the threat management facility, and displaying a description of the intermediate threat and the supplemental information in a user interface hosted by the threat management facility, where the user interface is configured for user investigation and disposition of the intermediate threat.
    Type: Application
    Filed: March 28, 2022
    Publication date: July 7, 2022
    Inventors: Joshua Daniel Saxe, Andrew J. Thomas, Russell Humphries, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy
  • Patent number: 11360674
    Abstract: A magazine-based data storage library in connection with a disk drive-based archive storage system is described that essentially generates parity data for tape formatted data streams (stored to tape cartridges) that do not align by way of data blocks or file marks. Data streams intended for tape storage sent to tape cartridges are also sent to a disk drive storage system via an encoder where parity of the data streams can be generated. More specifically, the encoder digitally formats tape blocks and tape marks (as well as other tape formatted structure) in a digital stream of data that can be added to other encoded digital streams of data to generate parity. To reconstruct a specific tape cartridge from a tape set, the encoded data from each of the tapes in the tape set are subtracted from the parity data and the remaining encoded data is decoded and sent to a designated tape cartridge.
    Type: Grant
    Filed: January 13, 2020
    Date of Patent: June 14, 2022
    Assignee: Spectra Logic Corporation
    Inventor: Joshua Daniel Carter