Patents by Inventor Joshua DANIEL
Joshua DANIEL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230070107Abstract: Articles and methods for archival raised image printing is disclosed. The process includes modifying an electronic image, printing the image on a paper substrate to form a printed substrate, applying the printed substrate onto a barrier substrate via an applicator such that the applicator creates a wall around the outer edge of the image, coating the printed substrate with a varnish composition, and drying the printed substrate in a humidity controlled environment. This configuration provides an efficient system of archival printing to print raised images on an article.Type: ApplicationFiled: August 17, 2022Publication date: March 9, 2023Inventor: Joshua Daniel NADEAU
-
Patent number: 11586751Abstract: A computer implemented method for access control for a restricted resource in a computer system, the method including receiving a first set of records for the computer system, each record detailing an occurrence in the computer system during a training time period when the resource is accessed in an approved manner; generating a sparse distributed representation of the set of records to form a training set for a hierarchical temporal memory (HTM); training the HTM based on the training set in order that the trained HTM provides a model of the operation of the computer system during the training time period; receiving a second set of records for the computer system, each record detailing an occurrence in the computer system during an operating time period for the computer system in use by a consumer of the resource; generating a sparse distributed representation of the second set of records to form an input set for the trained HTM; executing the trained HTM based on the input set to determine a degree of recogType: GrantFiled: March 26, 2018Date of Patent: February 21, 2023Assignee: British Telecommunications Public Limited CompanyInventors: Joshua Daniel, Xiaofeng Du
-
Patent number: 11552962Abstract: An ensemble of detection techniques are used to identify code that presents intermediate levels of threat. For example, an ensemble of machine learning techniques may be used to evaluate suspiciousness based on binaries, file paths, behaviors, reputations, and so forth, and code may be sorted into safe, unsafe, intermediate, or any similar categories. By filtering and prioritizing intermediate threats with these tools, human threat intervention can advantageously be directed toward code samples and associated contexts most appropriate for non-automated responses.Type: GrantFiled: September 12, 2018Date of Patent: January 10, 2023Assignee: Sophos LimitedInventors: Joshua Daniel Saxe, Andrew J. Thomas, Russell Humphries, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy
-
Publication number: 20230005799Abstract: Some embodiments include apparatuses and methods of fabricating the apparatuses. One of the apparatuses includes a substrate of a semiconductor die; a memory cell portion located over a first portion of the substrate; a conductive pad portion located over a second portion of the substrate and outside the memory cell portion; and a sensor circuit including a portion located over the second portion of the substrate and under the conductive pad portion. The conductive pad portion includes conductive pads. Each of the conductive pads is part of a respective electrical path coupled to a conductive contact of a base outside the substrate.Type: ApplicationFiled: August 22, 2022Publication date: January 5, 2023Inventors: Chiara Cerafogli, Kenneth William Marr, Brian J. Soderling, Michael P. Violette, Joshua Daniel Tomayer, James Eric Davis
-
Patent number: 11544380Abstract: In some embodiments, a processor can receive an input string associated with a potentially malicious artifact and convert each character in the input string into a vector of values to define a character matrix. The processor can apply a convolution matrix to a first window of the character matrix to define a first subscore, apply the convolution matrix to a second window of the character matrix to define a second subscore and combine the first subscore and the second subscore to define a score for the convolution matrix. The processor can provide the score for the convolution matrix as an input to a machine learning threat model, identify the potentially malicious artifact as malicious based on an output of the machine learning threat model, and perform a remedial action on the potentially malicious artifact based on identifying the potentially malicious artifact as malicious.Type: GrantFiled: December 17, 2020Date of Patent: January 3, 2023Assignee: Invincea, Inc.Inventor: Joshua Daniel Saxe
-
Patent number: 11539701Abstract: A computer implemented method of a network access point for secure network access by a mobile computing device, the mobile device being associated with the access point by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, the method including receiving a request from another network access point to associate the mobile device with the other access point, the request having associated identification information for the mobile device; responsive to a verification of an entitlement of the mobile device to access the network, generating a new record for storage in the blockchain, the new record associating the mobile device with the other access point and being validated by the miner components such that the other access point provides access to the network for the mobile device based on the validation of the new record.Type: GrantFiled: June 8, 2018Date of Patent: December 27, 2022Assignee: British Telecommunications Public Limited CompanyInventor: Joshua Daniel
-
Publication number: 20220373402Abstract: Self-calibrating a humidity sensor of an integrated humidity and temperature sensor, using the integrated heating element, and the temperature and humidity sensors, of the device, together with a firmware-based control loop running on a controller. The controller actively calculates and monitors one or both sensor output, and the slopes of the sensor outputs, in real time, while the heating element is on, and compares one or both slopes to a pre-programmed threshold, while in a programmable control loop, to then capture the appropriate relative humidity offset to apply to the device during normal operation (with the integrated heating element switched off) for correcting the relative humidity output from the device. Any singularly mounted in-system device can be calibrated, independent of external references, for in-system calibration.Type: ApplicationFiled: May 18, 2022Publication date: November 24, 2022Inventor: Joshua Daniel WYATT
-
Publication number: 20220353284Abstract: Embodiments disclosed include methods and apparatus for detecting a reputation of infrastructure associated with potentially malicious content. In some embodiments, an apparatus includes a memory and a processor. The processor is configured to identify an Internet Protocol (IP) address associated with potentially malicious content and define each row of a matrix by applying a different subnet mask from a plurality of subnet masks to a binary representation of the IP address to define that row of the matrix. The processor is further configured to provide the matrix as an input to a machine learning model, and receive, from the machine learning model, a score associated with a maliciousness of the IP address.Type: ApplicationFiled: April 23, 2021Publication date: November 3, 2022Applicant: Sophos LimitedInventors: Tamás VÖRÖS, Richard HARANG, Joshua Daniel SAXE
-
Patent number: 11488704Abstract: Embodiments described herein disclose technology for detecting and mitigating a health event. The system can monitor health information associated with the user. The health information can be collected by sensors. The system can assess the environment in the location of the user using one or more connected devices and/or sensors. Based on the health information and the environment, the system can detect whether a health event is occurring. In response to detecting a health event, the system can generate a mitigation plan and alter controllable environmental features according to the mitigation plan via the connected devices.Type: GrantFiled: August 19, 2019Date of Patent: November 1, 2022Assignee: United Services Automobile Association (USAA)Inventors: Justin Dax Haslam, Christina N. Nickel, Anthony Scott Farnsworth, David John Pflug, Kelly Q. Baker, Joshua Daniel Elkin
-
Patent number: 11489693Abstract: A computer implemented method of a network access point for secure network access by a mobile computing device, the mobile device being associated with the access point by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, the method including receiving a request from another network access point to associate the mobile device with the other access point, the request having associated identification information for the mobile device; responsive to a verification of an entitlement of the mobile device to access the network, generating a new record for storage in the blockchain, the new record associating the mobile device with the other access point and being validated by the miner components such that the other access point provides access to the network for the mobile device based on the validation of the new record, wherein the network access point provides access to a local network inaccesType: GrantFiled: June 8, 2018Date of Patent: November 1, 2022Inventors: Joshua Daniel, Paul Kearney
-
Patent number: 11470092Abstract: A computer implemented method of a first network access point to provide network access for a mobile device, the mobile device associated with a second network access point by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, wherein the mobile device has associated a quantity of cryptocurrency by a digitally signed record in the blockchain, the method including receiving a request from the mobile device to access the network; generating a first new record for storage in the blockchain to transfer a predetermined quantity of cryptocurrency associated with the requester to be associated with the first access point, the first new record being validated by the miner components; responsive to the validation of the first new record, notifying the second access point of the request of the mobile device to access the network; responsive to a validation of a second new record in the blockchain, theType: GrantFiled: June 8, 2018Date of Patent: October 11, 2022Assignee: British Telecommunications Public Limited CompanyInventor: Joshua Daniel
-
Patent number: 11469891Abstract: A computer implemented method of a receiving secure computing component to provide access to a cryptographic key for a key requester, the key being associated with an owning secure computing component by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, wherein the key requester has associated a quantity of cryptocurrency by a digitally signed record in the blockchain, the method including: receiving a request from the key requester to access the key; generating a first new record for storage in the blockchain to transfer a predetermined quantity of cryptocurrency associated with the requester to be associated with the receiving component, the first new record being validated by the miner components; responsive to the validation of the first new record, communicating a request to the owning component to transfer the key to the receiving component; responsive to securely receiving the key atType: GrantFiled: June 11, 2018Date of Patent: October 11, 2022Assignee: British Telecommunications Public Limited CompanyInventor: Joshua Daniel
-
Publication number: 20220318429Abstract: A compute instance may be configured to extract a feature of a data instance accessed by the compute instance, generate an anonymized feature value for the feature of the data instance, include the anonymized feature value in a feature vector corresponding to the data instance, and transmit the feature vector to a server-based computing system.Type: ApplicationFiled: March 30, 2021Publication date: October 6, 2022Inventors: Joseph H. Levy, Kenneth D. Ray, Joshua Daniel Saxe
-
Publication number: 20220318665Abstract: A compute instance stores a programmable feature extractor associated with a machine learning model maintained by a server-based computing system configured to communicate with the compute instance by way of a network. The machine learning model is based on a feature set that includes a plurality of features. The compute instance executes the programmable feature extractor to generate a feature vector corresponding to a data instance accessed by the compute instance, where the feature vector includes a feature value specific to the data instance for each feature included in the feature set. The compute instance transmits the feature vector corresponding to the data instance to the server-based computing system for use as a training input to the machine learning model.Type: ApplicationFiled: March 30, 2021Publication date: October 6, 2022Inventors: Joseph H. Levy, Kenneth D. Ray, Joshua Daniel Saxe
-
Patent number: 11451387Abstract: A computer implemented method of generating cryptographic keys for a plurality of hardware security modules (HSMs), the method including generating a plurality of cryptographic keys for use by the HSMs in providing cryptography functions, wherein the cryptographic keys are generated based on numerical data generated by a hardware random number generator; and storing the generated cryptographic keys in a secure key store, such that a key in the key store utilized by an HSM is flagged as utilized to prevent other HSMs utilizing the same key, so as to provide a rate of generation and storage of the cryptographic keys unconstrained by the resources of any HSM.Type: GrantFiled: May 2, 2019Date of Patent: September 20, 2022Assignee: BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANYInventors: Joshua Daniel, Ali Sajjad
-
Patent number: 11424169Abstract: Some embodiments include apparatuses and methods of fabricating the apparatuses. One of the apparatuses includes a substrate of a semiconductor die; a memory cell portion located over a first portion of the substrate; a conductive pad portion located over a second portion of the substrate and outside the memory cell portion; and a sensor circuit including a portion located over the second portion of the substrate and under the conductive pad portion. The conductive pad portion includes conductive pads. Each of the conductive pads is part of a respective electrical path coupled to a conductive contact of a base outside the substrate.Type: GrantFiled: August 8, 2019Date of Patent: August 23, 2022Assignee: Micron Technology, Inc.Inventors: Chiara Cerafogli, Kenneth William Marr, Brian J. Soderling, Michael P. Violette, Joshua Daniel Tomayer, James E. Davis
-
Patent number: 11418172Abstract: A two-terminal electrical protective device operates by harvesting energy from a small but non-zero voltage drop across a closed solid-state switch. From a default, open-circuit state, the device is remotely triggered by an AC signal to enter the desired conductive state. Power scavenged by an energy harvesting circuit while the device is in the conductive state, powers a gate drive circuit to hold the device in the conductive state for as long as current flows. When current stops, the device returns to the default open-circuit state.Type: GrantFiled: August 14, 2019Date of Patent: August 16, 2022Assignee: Generac Power Systems, Inc.Inventor: Joshua Daniel Kaufman
-
Patent number: 11411726Abstract: A computer implemented method of generating cryptographic keys for a hardware security module (HSM), the method including generating a plurality of cryptographic keys and storing the cryptographic keys for use by the HSM in providing cryptography functions, wherein the cryptographic keys are generated based on numerical data generated by a hardware random number generator, such that a rate of generation of the cryptographic keys unconstrained by the resources of the HSM, wherein the hardware random number generator operates based on a plurality of statistically random entropy data sources originating from natural phenomena so as to increase a degree of randomness of the numerical data.Type: GrantFiled: May 2, 2019Date of Patent: August 9, 2022Assignee: BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANYInventors: Joshua Daniel, Ali Sajjad
-
Publication number: 20220217167Abstract: A technique for dynamically updating a user interface for threat investigation may include receiving a scheduled transmittal of events in an event stream from an endpoint at a threat management facility, processing the event stream at the threat management facility to detect an intermediate threat, in response to detecting the intermediate threat at the threat management facility, requesting a transmittal of supplemental information from a data recorder on the endpoint, receiving the supplemental information in a supplemental transmittal from the endpoint to the threat management facility, and displaying a description of the intermediate threat and the supplemental information in a user interface hosted by the threat management facility, where the user interface is configured for user investigation and disposition of the intermediate threat.Type: ApplicationFiled: March 28, 2022Publication date: July 7, 2022Inventors: Joshua Daniel Saxe, Andrew J. Thomas, Russell Humphries, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy
-
Patent number: 11360674Abstract: A magazine-based data storage library in connection with a disk drive-based archive storage system is described that essentially generates parity data for tape formatted data streams (stored to tape cartridges) that do not align by way of data blocks or file marks. Data streams intended for tape storage sent to tape cartridges are also sent to a disk drive storage system via an encoder where parity of the data streams can be generated. More specifically, the encoder digitally formats tape blocks and tape marks (as well as other tape formatted structure) in a digital stream of data that can be added to other encoded digital streams of data to generate parity. To reconstruct a specific tape cartridge from a tape set, the encoded data from each of the tapes in the tape set are subtracted from the parity data and the remaining encoded data is decoded and sent to a designated tape cartridge.Type: GrantFiled: January 13, 2020Date of Patent: June 14, 2022Assignee: Spectra Logic CorporationInventor: Joshua Daniel Carter