Patents by Inventor Joshua DANIEL

Joshua DANIEL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11189536
    Abstract: A microelectronic chip device includes a semiconductor substrate and multiple on-chip strain sensors (OCSSs) constructed on the substrate at various locations of the substrate. The OCSSs may each include multiple piezoresistive devices configured to sense a strain at a location of the various locations and produce a strain signal representing the strain at that location. A strain measurement circuit may also be constructed on the semiconductor substrate and configured to measure strain parameters from the strain signals produced by the OCSSs. The strain parameters represent the strains at the various location. Values of the strain parameters can be used for analysis of mechanical stress on the chip device.
    Type: Grant
    Filed: March 6, 2019
    Date of Patent: November 30, 2021
    Assignee: Micron Technology, Inc.
    Inventors: Kenneth William Marr, Chiara Cerafogli, Michele Piccardi, Marco-Domenico Tiburzi, Eric Higgins Freeman, Joshua Daniel Tomayer
  • Publication number: 20210353895
    Abstract: The disclosure relates to medical tubes and methods of manufacturing medical tubes. The tube may be a composite structure made of two or more distinct components that are spirally wound to form an elongate tube. For example, one of the components may be a spirally wound elongate hollow body, and the other component may be an elongate structural component also spirally wound between turns of the spirally wound hollow body The tube need not be made from distinct components, however. For instance, an elongate hollow body formed (e.g., extruded) from a single material may be spirally wound to form an elongate tube. The elongate hollow body itself may in transverse cross-section have a thin wall portion and a relatively thicker or more rigid reinforcement portion. The tubes can be incorporated into a variety of medical circuits or may be employed for other medical uses.
    Type: Application
    Filed: April 21, 2021
    Publication date: November 18, 2021
    Inventors: Christopher Jaye Norman AMADIO, Elmo Benson STOKS, Charles Christopher NORTH, Mahran Maumoon SUJAU, Joshua Daniel STROOBANT, Gavin Walsh MILLAR, Matthew Liam BUSWELL, Ibrahim AL-TIAY, David Leon MCCAULEY, Andre VAN SCHALKWYK, Katja MUNKELT, Matthew Robert WILSON, Helgard OOSTHUYSEN, Sanjay Parag PATEL, Dominique Richard D'ANDREA, Grant Martin DOVER, Dean Antony BARKER, Jonathan David HARWOOD
  • Publication number: 20210326440
    Abstract: An apparatus for detecting malicious files includes a memory and a processor communicatively coupled to the memory. The processor receives multiple potentially malicious files. A first potentially malicious file has a first file format, and a second potentially malicious file has a second file format different than the first file format. The processor extracts a first set of strings from the first potentially malicious file, and extracts a second set of strings from the second potentially malicious file. First and second feature vectors are defined based on lengths of each string from the associated set of strings. The processor provides the first feature vector as an input to a machine learning model to produce a maliciousness classification of the first potentially malicious file, and provides the second feature vector as an input to the machine learning model to produce a maliciousness classification of the second potentially malicious file.
    Type: Application
    Filed: May 7, 2021
    Publication date: October 21, 2021
    Applicant: Sophos Limited
    Inventors: Joshua Daniel SAXE, Ethan M. RUDD, Richard HARANG
  • Patent number: 11153091
    Abstract: A computer implemented method for code distribution by a base station to a target device via a network, the distribution being made via one or more distribution servers arranged between the base station and the target device on the network, is disclosed.
    Type: Grant
    Filed: March 3, 2017
    Date of Patent: October 19, 2021
    Assignee: British Telecommunications Public Limited Company
    Inventors: Joshua Daniel, Gery Ducatel, Mohammad Zoualfaghari
  • Patent number: 11151268
    Abstract: An access control method for a restricted resource in a computer system having an operating system providing isolation between software processes executable in the operating system such that a first process executing in the operating system is prevented from accessing resources of a second process executing in the operating system, the method including receiving a software component for execution as an isolated process in the operating system; receiving a baseline profile for the software component defining characteristics of the software component at a runtime for identifying performance of the software component; generating a runtime profile of the software component in execution in the operating system defining characteristics of the component in execution; and permitting access by the software component to the restricted resource based on a comparison of the baseline profile and the runtime profile such that the software component exhibiting undesirable performance is precluded from accessing the restrict
    Type: Grant
    Filed: May 10, 2017
    Date of Patent: October 19, 2021
    Assignee: British Telecommunications Public Limited Company
    Inventors: Joshua Daniel, Fadi El-Moussa
  • Patent number: 11151244
    Abstract: A method in a computer system having an operating system providing isolation between software processes executable in the operating system such that a first process executing in the operating system is prevented from accessing resources of a second process executing in the operating system, the method including receiving a software component for execution as an isolated process in the operating system; receiving a baseline profile for the software component defining one or more characteristics of the software component at a runtime for identifying performance of the software component; generating a runtime profile of the software component in execution in the operating system defining characteristics of the component in execution; and flagging the software component in execution based on a comparison of the baseline profile and the runtime profile so as to identify an undesirable performance of the software component.
    Type: Grant
    Filed: May 10, 2017
    Date of Patent: October 19, 2021
    Assignee: British Telecommunications Public Limited Company
    Inventors: Joshua Daniel, Fadi El-Moussa
  • Patent number: 11146589
    Abstract: A computer implemented method for access control for a consumer accessing a restricted resource in a network connected computer system, the method including receiving a continuous sequence of data records relating to use, by the consumer, of the restricted resource, the resource being accessed by the consumer over an access network; continuously comparing the data records with an access control policy for the restricted resource; in response to a determination that the behavior is non-compliant with respect to the policy, generating and communicating a shared secret to the consumer, the shared secret being communicated via a communications channel other than the access network; receiving a response to a challenge from the user via the access network; and notifying the computer system that access to the resource by the consumer should be precluded based on a comparison of the response to the challenge and the shared-secret.
    Type: Grant
    Filed: March 26, 2018
    Date of Patent: October 12, 2021
    Assignee: British Telecommunications Public Limited Company
    Inventors: Joshua Daniel, Gery Ducatel
  • Publication number: 20210265984
    Abstract: A two-terminal electrical protective device operates by harvesting energy from a small but non-zero voltage drop across a closed solid-state switch. From a default, open-circuit state, the device is remotely triggered by an AC signal to enter the desired conductive state. Power scavenged by an energy harvesting circuit while the device is in the conductive state, powers a gate drive circuit to hold the device in the conductive state for as long as current flows. When current stops, the device returns to the default open-circuit state.
    Type: Application
    Filed: August 14, 2019
    Publication date: August 26, 2021
    Inventor: Joshua Daniel Kaufman
  • Patent number: 11080940
    Abstract: A system for component visualization according to an exemplary aspect of the present disclosure includes, among other things, a data module configured to access data corresponding to a component design. The component design includes at least one feature corresponding to a group of feature types. A display module is configured to display the data in an environment corresponding to a first user profile. A comparison module is configured to cause the display module to display the at least one feature when the at least one feature meets at least one predetermined criterion relating to the first user profile, and is configured to cause the display module to display a representation of the at least one feature when the at least one predetermined criterion is not met. The representation has a representation geometry that is a different geometry than a feature geometry of the at least one feature. A method for designing a component is also disclosed.
    Type: Grant
    Filed: December 17, 2015
    Date of Patent: August 3, 2021
    Assignee: RAYTHEON TECHNOLOGIES CORPORATION
    Inventors: William A. Sowa, Andrew D. Milliken, Joshua Daniel Winn
  • Publication number: 20210218564
    Abstract: A computer implemented method of generating cryptographic keys for a plurality of hardware security modules (HSMs), the method including generating a plurality of cryptographic keys for use by the HSMs in providing cryptography functions, wherein the cryptographic keys are generated based on numerical data generated by a hardware random number generator; and storing the generated cryptographic keys in a secure key store, such that a key in the key store utilized by an HSM is flagged as utilized to prevent other HSMs utilizing the same key, so as to provide a rate of generation and storage of the cryptographic keys unconstrained by the resources of any HSM.
    Type: Application
    Filed: May 2, 2019
    Publication date: July 15, 2021
    Inventors: Joshua DANIEL, Ali SAJJAD
  • Patent number: 11058844
    Abstract: The disclosure relates to medical tubes and methods of manufacturing medical tubes. The tube may be a composite structure made of two or more distinct components that are spirally wound to form an elongate tube. For example, one of the components may be a spirally wound elongate hollow body, and the other component may be an elongate structural component also spirally wound between turns of the spirally wound hollow body The tube need not be made from distinct components, however. For instance, an elongate hollow body formed (e.g., extruded) from a single material may be spirally wound to form an elongate tube. The elongate hollow body itself may in transverse cross-section have a thin wall portion and a relatively thicker or more rigid reinforcement portion. The tubes can be incorporated into a variety of medical circuits or may be employed for other medical uses.
    Type: Grant
    Filed: December 4, 2013
    Date of Patent: July 13, 2021
    Assignee: Fisher & Paykel Healthcare Limited
    Inventors: Christopher Jaye Norman Amadio, Elmo Benson Stoks, Charles Christopher North, Mahran Maumoon Sujau, Joshua Daniel Stroobant, Gavin Walsh Millar, Matthew Liam Buswell, Ibrahim Al-Tiay, David Leon McCauley, Andre van Schalkwyk, Katja Munkelt, Matthew Robert Wilson, Helgard Oosthuysen, Sanjay Parag Patel, Dominique Richard d'Andrea, Grant Martin Dover, Dean Antony Barker, Jonathan David Harwood
  • Publication number: 20210211440
    Abstract: An automated system attempts to characterize code as safe or unsafe. For intermediate code samples not placed with sufficient confidence in either category, human-readable analysis is automatically generated to assist a human reviewer in reaching a final disposition. For example, a random forest over human-interpretable features may be created and used to identify suspicious features in a manner that is understandable to, and actionable by, a human reviewer. Similarly, a k-nearest neighbor algorithm may be used to identify similar samples of known safe and unsafe code based on a model for, e.g., a file path, a URL, an executable, and so forth. Similar code may then be displayed (with other information) to a user for evaluation in a user interface. This comparative information can improve the speed and accuracy of human interventions by providing richer context for human review of potential threats.
    Type: Application
    Filed: March 1, 2021
    Publication date: July 8, 2021
    Inventors: Joshua Daniel Saxe, Andrew J. Thomas, Russell Humphries, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy
  • Publication number: 20210203495
    Abstract: A computer implemented method of generating cryptographic keys for a hardware security module (HSM), the method including generating a plurality of cryptographic keys and storing the cryptographic keys for use by the HSM in providing cryptography functions, wherein the cryptographic keys are generated based on numerical data generated by a hardware random number generator, such that a rate of generation of the cryptographic keys unconstrained by the resources of the HSM, wherein the hardware random number generator operates based on a plurality of statistically random entropy data sources originating from natural phenomena so as to increase a degree of randomness of the numerical data.
    Type: Application
    Filed: May 2, 2019
    Publication date: July 1, 2021
    Inventors: Joshua DANIEL, Ali SAJJAD
  • Publication number: 20210165881
    Abstract: In some embodiments, a processor can receive an input string associated with a potentially malicious artifact and convert each character in the input string into a vector of values to define a character matrix. The processor can apply a convolution matrix to a first window of the character matrix to define a first subscore, apply the convolution matrix to a second window of the character matrix to define a second subscore and combine the first subscore and the second subscore to define a score for the convolution matrix. The processor can provide the score for the convolution matrix as an input to a machine learning threat model, identify the potentially malicious artifact as malicious based on an output of the machine learning threat model, and perform a remedial action on the potentially malicious artifact based on identifying the potentially malicious artifact as malicious.
    Type: Application
    Filed: December 17, 2020
    Publication date: June 3, 2021
    Applicant: Invincea, Inc.
    Inventor: Joshua Daniel SAXE
  • Patent number: 11023248
    Abstract: A computer implemented method to execute a software application in a network attached computing environment, the application being defined by a set of required software services to constitute the application, the required services being selected from services indicated in a component registry, the method including recording a block to a blockchain data structure, the new block identifying at least a subset of the set of required services; receiving one or more further blocks from the blockchain data structure, each of the further blocks referencing a service provider for providing one or more of the required services; and selecting one or more service providers identified in the blockchain and defining a specification for an application assembler component to assemble the software application, the specification identifying selected service providers.
    Type: Grant
    Filed: March 3, 2017
    Date of Patent: June 1, 2021
    Assignee: British Telecommunications Public Limited Company
    Inventors: Joshua Daniel, Gery Ducatel
  • Patent number: 11003774
    Abstract: An apparatus for detecting malicious files includes a memory and a processor communicatively coupled to the memory. The processor receives multiple potentially malicious files. A first potentially malicious file has a first file format, and a second potentially malicious file has a second file format different than the first file format. The processor extracts a first set of strings from the first potentially malicious file, and extracts a second set of strings from the second potentially malicious file. First and second feature vectors are defined based on lengths of each string from the associated set of strings. The processor provides the first feature vector as an input to a machine learning model to produce a maliciousness classification of the first potentially malicious file, and provides the second feature vector as an input to the machine learning model to produce a maliciousness classification of the second potentially malicious file.
    Type: Grant
    Filed: January 25, 2019
    Date of Patent: May 11, 2021
    Assignee: Sophos Limited
    Inventors: Joshua Daniel Saxe, Ethan M. Rudd, Richard Harang
  • Publication number: 20210099299
    Abstract: A computer implemented method of a receiving secure computing component to provide access to a cryptographic key for a key requester, the key being associated with an owning secure computing component by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, wherein the key requester has associated a quantity of cryptocurrency by a digitally signed record in the blockchain, the method including receiving a request from the key requester to access the key; generating a first new record for storage in the blockchain to transfer a predetermined quantity of cryptocurrency associated with the requester to be associated with the receiving component, the first new record being validated by the miner components; responsive to the validation of the first new record, communicating a request to the owning component to transfer the key to the receiving component; responsive to securely receiving the key at t
    Type: Application
    Filed: June 11, 2018
    Publication date: April 1, 2021
    Applicant: British Telecommunications Public Limited Company
    Inventor: Joshua DANIEL
  • Patent number: D916422
    Type: Grant
    Filed: November 16, 2018
    Date of Patent: April 13, 2021
    Assignee: GREEN OX PALLET TECHNOLOGY, LLC
    Inventors: Joshua Daniel Herbeck, Gregory D. Van de Mark
  • Patent number: D929758
    Type: Grant
    Filed: March 8, 2019
    Date of Patent: September 7, 2021
    Inventors: Brenton Hutchinson, Joshua Daniel Grothman-Pelton
  • Patent number: D930319
    Type: Grant
    Filed: January 20, 2021
    Date of Patent: September 7, 2021
    Assignee: GREEN OX PALLET TECHNOLOGY, LLC
    Inventors: Joshua Daniel Herbeck, Gregory D. Van de Mark