Patents by Inventor Joshua DANIEL
Joshua DANIEL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11687417Abstract: Due to the threat of virus attacks and ransom ware, an apparatus and methods for protecting backup storage devices from malicious software virus attacks is explored. An independent backup storage system is connected to a primary storage server over an undiscoverable communications line. The backup storage system is a read-only backup storage system most of the time buffering the backup storage system from a virus or attack on the primary storage server. The backup storage system changes from a read-only backup storage system to a read/write backup storage system only during a backup window of time where data is backed up to the backup storage system. A snapshot of the backup data is maintained in the backup storage system and can be made available at numerous points of time in the past if the data primary storage server becomes corrupted.Type: GrantFiled: October 12, 2022Date of Patent: June 27, 2023Assignee: Spectra Logic CorporationInventors: David Lee Trachy, Joshua Daniel Carter
-
Publication number: 20230197043Abstract: A computer-implemented method of processing audio data, the method comprising receiving input audio data (x) comprising a time-series of amplitude values; transforming the input audio data (x) into an input frequency band decomposition (X1) of the input audio data (x); transforming the input frequency band decomposition (X1) into a first latent representation (Z); processing the first latent representation (Z) by a first deep neural network to obtain a second latent representation (Z{circumflex over (?)}, Z1{circumflex over (?)}); transforming the second latent representation (Z{circumflex over (?)}, Z1{circumflex over (?)}) to obtain a discrete approximation (X3{circumflex over (?)}); element-wise multiplying the discrete approximation (X3{circumflex over (?)}) and a residual feature map (R, X5{circumflex over (?)}) to obtain a modified feature map, wherein the residual feature map (R, X5{circumflex over (?)}) is derived from the input frequency band decomposition (X1); processing a pre-shaped frequency bandType: ApplicationFiled: May 12, 2020Publication date: June 22, 2023Applicant: QUEEN MARY UNIVERSITY OF LONDONInventors: Marco Antonio MARTINEZ RAMIREZ, Joshua Daniel REISS, Emmanouil BENETOS
-
Publication number: 20230195897Abstract: In some embodiments, a processor can receive an input string associated with a potentially malicious artifact and convert each character in the input string into a vector of values to define a character matrix. The processor can apply a convolution matrix to a first window of the character matrix to define a first subscore, apply the convolution matrix to a second window of the character matrix to define a second sub score and combine the first subscore and the second subscore to define a score for the convolution matrix. The processor can provide the score for the convolution matrix as an input to a machine learning threat model, identify the potentially malicious artifact as malicious based on an output of the machine learning threat model, and perform a remedial action on the potentially malicious artifact based on identifying the potentially malicious artifact as malicious.Type: ApplicationFiled: December 19, 2022Publication date: June 22, 2023Applicant: Invincea, Inc.Inventor: Joshua Daniel SAXE
-
Publication number: 20230178234Abstract: A method for tracking injection site information includes displaying, on a user interface, a plurality of injection zones, each of the plurality of injection zones representing a segment of the body suitable for medication injection and including a graphical indicator indicating a period of time since a most recent previous injection in the injection zone. The method also includes receiving, via the user interface, injection information relating to a new injection in a particular injection zone. The method also includes updating a graphical indicator of the particular injection zone on the user interface to indicate a new date and time of injection to the particular injection zone.Type: ApplicationFiled: January 30, 2023Publication date: June 8, 2023Applicant: Embecta Corp.Inventors: Ryan Francis Bedell, Danielle V. Butler, Linda Charlite-Ruiz, Douglas McClure, Rita Saltiel-Berzin, Sean M. Ulrich, Joshua Daniel Coyle, Alice Leung, Teresa Oliveria
-
Publication number: 20230141771Abstract: A battery module includes features to optimize cooling while providing electrical isolation and cell gas-venting channels. The battery module can include the integration of a heatsink in order to improve thermal performance. Thermally conductive pads can be provided to create an electrically isolated interface between a plurality of series-connected battery-cell lead plates, at different potentials, and the heatsink. Optimization, by stacking thin and thick thermally conductive pads, allows for creation of gas-venting channels along the positive cell terminal locations. In some arrangements, a plurality of fluid paths are disposed between the inlet and the outlet of the battery module to provide heat convective airflow through the battery module.Type: ApplicationFiled: October 25, 2022Publication date: May 11, 2023Applicant: Generac Power Systems, Inc.Inventors: Joel Hooper, Peter Lex, Tod Tesch, Benjamin Francis Polito, Joshua Daniel Kaufman
-
Publication number: 20230123919Abstract: Due to the threat of virus attacks and ransom ware, an apparatus and methods for protecting backup storage devices from malicious software virus attacks is explored. An independent backup storage system is connected to a primary storage server over an undiscoverable communications line. The backup storage system is a read-only backup storage system most of the time buffering the backup storage system from a virus or attack on the primary storage server. The backup storage system changes from a read-only backup storage system to a read/write backup storage system only during a backup window of time where data is backed up to the backup storage system. A snapshot of the backup data is maintained in the backup storage system and can be made available at numerous points of time in the past if the data primary storage server becomes corrupted.Type: ApplicationFiled: October 12, 2022Publication date: April 20, 2023Inventors: David Lee Trachy, Joshua Daniel Carter
-
Patent number: 11609991Abstract: In some embodiments, a method includes processing at least a portion of a received file into a first set of fragments and analyzing each fragment from the first set of fragments using a machine learning model to identify within each fragment first information potentially relevant to whether the file is malicious. The method includes forming a second set of fragments by combining adjacent fragments from the first set of fragments and analyzing each fragment from the second set of fragments using the machine learning model to identify second information potentially relevant to whether the file is malicious. The method includes identifying the file as malicious based on the first information within at least one fragment from the first set of fragments and the second information within at least one fragment from the second set of fragments. The method includes performing a remedial action based on identifying the file as malicious.Type: GrantFiled: April 21, 2020Date of Patent: March 21, 2023Assignee: Sophos LimitedInventors: Joshua Daniel Saxe, Richard Harang
-
Publication number: 20230070107Abstract: Articles and methods for archival raised image printing is disclosed. The process includes modifying an electronic image, printing the image on a paper substrate to form a printed substrate, applying the printed substrate onto a barrier substrate via an applicator such that the applicator creates a wall around the outer edge of the image, coating the printed substrate with a varnish composition, and drying the printed substrate in a humidity controlled environment. This configuration provides an efficient system of archival printing to print raised images on an article.Type: ApplicationFiled: August 17, 2022Publication date: March 9, 2023Inventor: Joshua Daniel NADEAU
-
Patent number: 11586751Abstract: A computer implemented method for access control for a restricted resource in a computer system, the method including receiving a first set of records for the computer system, each record detailing an occurrence in the computer system during a training time period when the resource is accessed in an approved manner; generating a sparse distributed representation of the set of records to form a training set for a hierarchical temporal memory (HTM); training the HTM based on the training set in order that the trained HTM provides a model of the operation of the computer system during the training time period; receiving a second set of records for the computer system, each record detailing an occurrence in the computer system during an operating time period for the computer system in use by a consumer of the resource; generating a sparse distributed representation of the second set of records to form an input set for the trained HTM; executing the trained HTM based on the input set to determine a degree of recogType: GrantFiled: March 26, 2018Date of Patent: February 21, 2023Assignee: British Telecommunications Public Limited CompanyInventors: Joshua Daniel, Xiaofeng Du
-
Patent number: 11552962Abstract: An ensemble of detection techniques are used to identify code that presents intermediate levels of threat. For example, an ensemble of machine learning techniques may be used to evaluate suspiciousness based on binaries, file paths, behaviors, reputations, and so forth, and code may be sorted into safe, unsafe, intermediate, or any similar categories. By filtering and prioritizing intermediate threats with these tools, human threat intervention can advantageously be directed toward code samples and associated contexts most appropriate for non-automated responses.Type: GrantFiled: September 12, 2018Date of Patent: January 10, 2023Assignee: Sophos LimitedInventors: Joshua Daniel Saxe, Andrew J. Thomas, Russell Humphries, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy
-
Publication number: 20230005799Abstract: Some embodiments include apparatuses and methods of fabricating the apparatuses. One of the apparatuses includes a substrate of a semiconductor die; a memory cell portion located over a first portion of the substrate; a conductive pad portion located over a second portion of the substrate and outside the memory cell portion; and a sensor circuit including a portion located over the second portion of the substrate and under the conductive pad portion. The conductive pad portion includes conductive pads. Each of the conductive pads is part of a respective electrical path coupled to a conductive contact of a base outside the substrate.Type: ApplicationFiled: August 22, 2022Publication date: January 5, 2023Inventors: Chiara Cerafogli, Kenneth William Marr, Brian J. Soderling, Michael P. Violette, Joshua Daniel Tomayer, James Eric Davis
-
Patent number: 11544380Abstract: In some embodiments, a processor can receive an input string associated with a potentially malicious artifact and convert each character in the input string into a vector of values to define a character matrix. The processor can apply a convolution matrix to a first window of the character matrix to define a first subscore, apply the convolution matrix to a second window of the character matrix to define a second subscore and combine the first subscore and the second subscore to define a score for the convolution matrix. The processor can provide the score for the convolution matrix as an input to a machine learning threat model, identify the potentially malicious artifact as malicious based on an output of the machine learning threat model, and perform a remedial action on the potentially malicious artifact based on identifying the potentially malicious artifact as malicious.Type: GrantFiled: December 17, 2020Date of Patent: January 3, 2023Assignee: Invincea, Inc.Inventor: Joshua Daniel Saxe
-
Patent number: 11539701Abstract: A computer implemented method of a network access point for secure network access by a mobile computing device, the mobile device being associated with the access point by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, the method including receiving a request from another network access point to associate the mobile device with the other access point, the request having associated identification information for the mobile device; responsive to a verification of an entitlement of the mobile device to access the network, generating a new record for storage in the blockchain, the new record associating the mobile device with the other access point and being validated by the miner components such that the other access point provides access to the network for the mobile device based on the validation of the new record.Type: GrantFiled: June 8, 2018Date of Patent: December 27, 2022Assignee: British Telecommunications Public Limited CompanyInventor: Joshua Daniel
-
Publication number: 20220373402Abstract: Self-calibrating a humidity sensor of an integrated humidity and temperature sensor, using the integrated heating element, and the temperature and humidity sensors, of the device, together with a firmware-based control loop running on a controller. The controller actively calculates and monitors one or both sensor output, and the slopes of the sensor outputs, in real time, while the heating element is on, and compares one or both slopes to a pre-programmed threshold, while in a programmable control loop, to then capture the appropriate relative humidity offset to apply to the device during normal operation (with the integrated heating element switched off) for correcting the relative humidity output from the device. Any singularly mounted in-system device can be calibrated, independent of external references, for in-system calibration.Type: ApplicationFiled: May 18, 2022Publication date: November 24, 2022Inventor: Joshua Daniel WYATT
-
Publication number: 20220353284Abstract: Embodiments disclosed include methods and apparatus for detecting a reputation of infrastructure associated with potentially malicious content. In some embodiments, an apparatus includes a memory and a processor. The processor is configured to identify an Internet Protocol (IP) address associated with potentially malicious content and define each row of a matrix by applying a different subnet mask from a plurality of subnet masks to a binary representation of the IP address to define that row of the matrix. The processor is further configured to provide the matrix as an input to a machine learning model, and receive, from the machine learning model, a score associated with a maliciousness of the IP address.Type: ApplicationFiled: April 23, 2021Publication date: November 3, 2022Applicant: Sophos LimitedInventors: Tamás VÖRÖS, Richard HARANG, Joshua Daniel SAXE
-
Patent number: 11488704Abstract: Embodiments described herein disclose technology for detecting and mitigating a health event. The system can monitor health information associated with the user. The health information can be collected by sensors. The system can assess the environment in the location of the user using one or more connected devices and/or sensors. Based on the health information and the environment, the system can detect whether a health event is occurring. In response to detecting a health event, the system can generate a mitigation plan and alter controllable environmental features according to the mitigation plan via the connected devices.Type: GrantFiled: August 19, 2019Date of Patent: November 1, 2022Assignee: United Services Automobile Association (USAA)Inventors: Justin Dax Haslam, Christina N. Nickel, Anthony Scott Farnsworth, David John Pflug, Kelly Q. Baker, Joshua Daniel Elkin
-
Patent number: 11489693Abstract: A computer implemented method of a network access point for secure network access by a mobile computing device, the mobile device being associated with the access point by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, the method including receiving a request from another network access point to associate the mobile device with the other access point, the request having associated identification information for the mobile device; responsive to a verification of an entitlement of the mobile device to access the network, generating a new record for storage in the blockchain, the new record associating the mobile device with the other access point and being validated by the miner components such that the other access point provides access to the network for the mobile device based on the validation of the new record, wherein the network access point provides access to a local network inaccesType: GrantFiled: June 8, 2018Date of Patent: November 1, 2022Inventors: Joshua Daniel, Paul Kearney
-
Patent number: 11469891Abstract: A computer implemented method of a receiving secure computing component to provide access to a cryptographic key for a key requester, the key being associated with an owning secure computing component by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, wherein the key requester has associated a quantity of cryptocurrency by a digitally signed record in the blockchain, the method including: receiving a request from the key requester to access the key; generating a first new record for storage in the blockchain to transfer a predetermined quantity of cryptocurrency associated with the requester to be associated with the receiving component, the first new record being validated by the miner components; responsive to the validation of the first new record, communicating a request to the owning component to transfer the key to the receiving component; responsive to securely receiving the key atType: GrantFiled: June 11, 2018Date of Patent: October 11, 2022Assignee: British Telecommunications Public Limited CompanyInventor: Joshua Daniel
-
Patent number: 11470092Abstract: A computer implemented method of a first network access point to provide network access for a mobile device, the mobile device associated with a second network access point by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, wherein the mobile device has associated a quantity of cryptocurrency by a digitally signed record in the blockchain, the method including receiving a request from the mobile device to access the network; generating a first new record for storage in the blockchain to transfer a predetermined quantity of cryptocurrency associated with the requester to be associated with the first access point, the first new record being validated by the miner components; responsive to the validation of the first new record, notifying the second access point of the request of the mobile device to access the network; responsive to a validation of a second new record in the blockchain, theType: GrantFiled: June 8, 2018Date of Patent: October 11, 2022Assignee: British Telecommunications Public Limited CompanyInventor: Joshua Daniel
-
Publication number: 20220318665Abstract: A compute instance stores a programmable feature extractor associated with a machine learning model maintained by a server-based computing system configured to communicate with the compute instance by way of a network. The machine learning model is based on a feature set that includes a plurality of features. The compute instance executes the programmable feature extractor to generate a feature vector corresponding to a data instance accessed by the compute instance, where the feature vector includes a feature value specific to the data instance for each feature included in the feature set. The compute instance transmits the feature vector corresponding to the data instance to the server-based computing system for use as a training input to the machine learning model.Type: ApplicationFiled: March 30, 2021Publication date: October 6, 2022Inventors: Joseph H. Levy, Kenneth D. Ray, Joshua Daniel Saxe