Patents by Inventor Joshua DANIEL

Joshua DANIEL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210265984
    Abstract: A two-terminal electrical protective device operates by harvesting energy from a small but non-zero voltage drop across a closed solid-state switch. From a default, open-circuit state, the device is remotely triggered by an AC signal to enter the desired conductive state. Power scavenged by an energy harvesting circuit while the device is in the conductive state, powers a gate drive circuit to hold the device in the conductive state for as long as current flows. When current stops, the device returns to the default open-circuit state.
    Type: Application
    Filed: August 14, 2019
    Publication date: August 26, 2021
    Inventor: Joshua Daniel Kaufman
  • Patent number: 11080940
    Abstract: A system for component visualization according to an exemplary aspect of the present disclosure includes, among other things, a data module configured to access data corresponding to a component design. The component design includes at least one feature corresponding to a group of feature types. A display module is configured to display the data in an environment corresponding to a first user profile. A comparison module is configured to cause the display module to display the at least one feature when the at least one feature meets at least one predetermined criterion relating to the first user profile, and is configured to cause the display module to display a representation of the at least one feature when the at least one predetermined criterion is not met. The representation has a representation geometry that is a different geometry than a feature geometry of the at least one feature. A method for designing a component is also disclosed.
    Type: Grant
    Filed: December 17, 2015
    Date of Patent: August 3, 2021
    Assignee: RAYTHEON TECHNOLOGIES CORPORATION
    Inventors: William A. Sowa, Andrew D. Milliken, Joshua Daniel Winn
  • Publication number: 20210218564
    Abstract: A computer implemented method of generating cryptographic keys for a plurality of hardware security modules (HSMs), the method including generating a plurality of cryptographic keys for use by the HSMs in providing cryptography functions, wherein the cryptographic keys are generated based on numerical data generated by a hardware random number generator; and storing the generated cryptographic keys in a secure key store, such that a key in the key store utilized by an HSM is flagged as utilized to prevent other HSMs utilizing the same key, so as to provide a rate of generation and storage of the cryptographic keys unconstrained by the resources of any HSM.
    Type: Application
    Filed: May 2, 2019
    Publication date: July 15, 2021
    Inventors: Joshua DANIEL, Ali SAJJAD
  • Patent number: 11058844
    Abstract: The disclosure relates to medical tubes and methods of manufacturing medical tubes. The tube may be a composite structure made of two or more distinct components that are spirally wound to form an elongate tube. For example, one of the components may be a spirally wound elongate hollow body, and the other component may be an elongate structural component also spirally wound between turns of the spirally wound hollow body The tube need not be made from distinct components, however. For instance, an elongate hollow body formed (e.g., extruded) from a single material may be spirally wound to form an elongate tube. The elongate hollow body itself may in transverse cross-section have a thin wall portion and a relatively thicker or more rigid reinforcement portion. The tubes can be incorporated into a variety of medical circuits or may be employed for other medical uses.
    Type: Grant
    Filed: December 4, 2013
    Date of Patent: July 13, 2021
    Assignee: Fisher & Paykel Healthcare Limited
    Inventors: Christopher Jaye Norman Amadio, Elmo Benson Stoks, Charles Christopher North, Mahran Maumoon Sujau, Joshua Daniel Stroobant, Gavin Walsh Millar, Matthew Liam Buswell, Ibrahim Al-Tiay, David Leon McCauley, Andre van Schalkwyk, Katja Munkelt, Matthew Robert Wilson, Helgard Oosthuysen, Sanjay Parag Patel, Dominique Richard d'Andrea, Grant Martin Dover, Dean Antony Barker, Jonathan David Harwood
  • Publication number: 20210211440
    Abstract: An automated system attempts to characterize code as safe or unsafe. For intermediate code samples not placed with sufficient confidence in either category, human-readable analysis is automatically generated to assist a human reviewer in reaching a final disposition. For example, a random forest over human-interpretable features may be created and used to identify suspicious features in a manner that is understandable to, and actionable by, a human reviewer. Similarly, a k-nearest neighbor algorithm may be used to identify similar samples of known safe and unsafe code based on a model for, e.g., a file path, a URL, an executable, and so forth. Similar code may then be displayed (with other information) to a user for evaluation in a user interface. This comparative information can improve the speed and accuracy of human interventions by providing richer context for human review of potential threats.
    Type: Application
    Filed: March 1, 2021
    Publication date: July 8, 2021
    Inventors: Joshua Daniel Saxe, Andrew J. Thomas, Russell Humphries, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy
  • Publication number: 20210203495
    Abstract: A computer implemented method of generating cryptographic keys for a hardware security module (HSM), the method including generating a plurality of cryptographic keys and storing the cryptographic keys for use by the HSM in providing cryptography functions, wherein the cryptographic keys are generated based on numerical data generated by a hardware random number generator, such that a rate of generation of the cryptographic keys unconstrained by the resources of the HSM, wherein the hardware random number generator operates based on a plurality of statistically random entropy data sources originating from natural phenomena so as to increase a degree of randomness of the numerical data.
    Type: Application
    Filed: May 2, 2019
    Publication date: July 1, 2021
    Inventors: Joshua DANIEL, Ali SAJJAD
  • Publication number: 20210165881
    Abstract: In some embodiments, a processor can receive an input string associated with a potentially malicious artifact and convert each character in the input string into a vector of values to define a character matrix. The processor can apply a convolution matrix to a first window of the character matrix to define a first subscore, apply the convolution matrix to a second window of the character matrix to define a second subscore and combine the first subscore and the second subscore to define a score for the convolution matrix. The processor can provide the score for the convolution matrix as an input to a machine learning threat model, identify the potentially malicious artifact as malicious based on an output of the machine learning threat model, and perform a remedial action on the potentially malicious artifact based on identifying the potentially malicious artifact as malicious.
    Type: Application
    Filed: December 17, 2020
    Publication date: June 3, 2021
    Applicant: Invincea, Inc.
    Inventor: Joshua Daniel SAXE
  • Patent number: 11023248
    Abstract: A computer implemented method to execute a software application in a network attached computing environment, the application being defined by a set of required software services to constitute the application, the required services being selected from services indicated in a component registry, the method including recording a block to a blockchain data structure, the new block identifying at least a subset of the set of required services; receiving one or more further blocks from the blockchain data structure, each of the further blocks referencing a service provider for providing one or more of the required services; and selecting one or more service providers identified in the blockchain and defining a specification for an application assembler component to assemble the software application, the specification identifying selected service providers.
    Type: Grant
    Filed: March 3, 2017
    Date of Patent: June 1, 2021
    Assignee: British Telecommunications Public Limited Company
    Inventors: Joshua Daniel, Gery Ducatel
  • Patent number: 11003774
    Abstract: An apparatus for detecting malicious files includes a memory and a processor communicatively coupled to the memory. The processor receives multiple potentially malicious files. A first potentially malicious file has a first file format, and a second potentially malicious file has a second file format different than the first file format. The processor extracts a first set of strings from the first potentially malicious file, and extracts a second set of strings from the second potentially malicious file. First and second feature vectors are defined based on lengths of each string from the associated set of strings. The processor provides the first feature vector as an input to a machine learning model to produce a maliciousness classification of the first potentially malicious file, and provides the second feature vector as an input to the machine learning model to produce a maliciousness classification of the second potentially malicious file.
    Type: Grant
    Filed: January 25, 2019
    Date of Patent: May 11, 2021
    Assignee: Sophos Limited
    Inventors: Joshua Daniel Saxe, Ethan M. Rudd, Richard Harang
  • Publication number: 20210099299
    Abstract: A computer implemented method of a receiving secure computing component to provide access to a cryptographic key for a key requester, the key being associated with an owning secure computing component by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, wherein the key requester has associated a quantity of cryptocurrency by a digitally signed record in the blockchain, the method including receiving a request from the key requester to access the key; generating a first new record for storage in the blockchain to transfer a predetermined quantity of cryptocurrency associated with the requester to be associated with the receiving component, the first new record being validated by the miner components; responsive to the validation of the first new record, communicating a request to the owning component to transfer the key to the receiving component; responsive to securely receiving the key at t
    Type: Application
    Filed: June 11, 2018
    Publication date: April 1, 2021
    Applicant: British Telecommunications Public Limited Company
    Inventor: Joshua DANIEL
  • Patent number: 10961870
    Abstract: A method of cooling a portion of a gas turbine engine includes positioning a tie rod relative to an inner frame case. The tie rod includes a bushing opening and the inner frame case includes a fastener opening. A fastener is secured through the fastener opening in the inner frame case to a threaded bushing located in the bushing opening. The threaded bushing includes a distal end that forms a clearance gap with the inner frame case. Heat is transferred from the fastener through the threaded bushing to prevent the fastener from creeping.
    Type: Grant
    Filed: May 30, 2019
    Date of Patent: March 30, 2021
    Assignee: RAYTHEON TECHNOLOGIES CORPORATION
    Inventors: Joshua Daniel Winn, Alexander Broulidakis, Paul K. Sanchez, Anthony P Cherolis, Joseph J. Sedor, Christopher Treat
  • Publication number: 20210089650
    Abstract: A computer implemented method to detect a computer system in execution operating in a manner that is not compliant with a definition of a set of compliant operations, the method including receiving a first set of records for the computer system, each record detailing an occurrence in the computer system during a first predetermined time period; generating a sparse distributed representation of the set of records to form a training set for a hierarchical temporal memory (HTM); training the HTM based on the training set in order that the trained HTM provides a model of the operation of the computer system during the predetermined time period; selecting at least a subset of operations in the set of compliant operations and causing the invocation of each operation of the subset in the computer system over a second predetermined time period to generate a second set of records of occurrences in the computer system; generating a sparse distributed representation of the set of records to form an input set for the tra
    Type: Application
    Filed: March 26, 2018
    Publication date: March 25, 2021
    Applicant: British Telecommunications Public Limited Company
    Inventors: Joshua Daniel, Xiaofeng Du
  • Publication number: 20210089670
    Abstract: A computer implemented method for access control for a restricted resource in a computer system, the method including receiving a first set of records for the computer system, each record detailing an occurrence in the computer system during a training time period when the resource is accessed in an approved manner; generating a sparse distributed representation of the set of records to form a training set for a hierarchical temporal memory (HTM); training the HTM based on the training set in order that the trained HTM provides a model of the operation of the computer system during the training time period; receiving a second set of records for the computer system, each record detailing an occurrence in the computer system during an operating time period for the computer system in use by a consumer of the resource; generating a sparse distributed representation of the second set of records to form an input set for the trained HTM; executing the trained HTM based on the input set to determine a degree of recog
    Type: Application
    Filed: March 26, 2018
    Publication date: March 25, 2021
    Applicant: British Telecommunications Public Limited Company
    Inventors: Joshua Daniel, Xiaofeng Du
  • Patent number: 10956614
    Abstract: A computer implemented method of a resource provider for access control for a restricted resource in a network connected computer system, wherein a blockchain data structure accessible via the network stores digitally signed records validated by network connected miner software components including a provider record associated with the resource provider, the method including: identifying an access control role definition for access to the resource, the role including a specification of access permissions; receiving a request from a resource consumer for access to the resource; communicating, to the resource consumer, an indication of a quantity of a cryptocurrency required for access to the resource; and in response to a determination that the required quantity of cryptocurrency is transferred to the provider record in the blockchain, the transfer being caused by a blockchain transaction including an identification of the role and the transaction being validated by a miner component, granting the consumer acc
    Type: Grant
    Filed: July 20, 2016
    Date of Patent: March 23, 2021
    Assignee: British Telecommunications Public Limited Company
    Inventors: Joshua Daniel, Gery Ducatel, Theo Dimitrakos
  • Publication number: 20210083856
    Abstract: A computer implemented method of a secure computing component to provide access to a cryptographic key, the key being associated with the secure component by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, the method including receiving a request from another secure computing component to associate the key with the other component, the request having associated identification information for a requester of the key; responsive to a verification of an entitlement of the requester, generating a new record for storage in the blockchain, the new record associating the key with the other component and being validated by the miner components; and further responsive to the verification, securely transferring the key to the other component so as to provide access to the key to the key requester via the other component.
    Type: Application
    Filed: June 11, 2018
    Publication date: March 18, 2021
    Applicant: British Telecommunications Public Limited Company
    Inventor: Joshua DANIEL
  • Patent number: 10951708
    Abstract: A computer implemented method of a network connected data storage system, the method including receiving, via the network, and storing a data set including a plurality of data items encrypted using an index-based searchable encryption scheme, wherein the searchable encryption scheme has associated a server index and a client index; receiving, via the network, and storing a set of hashed information for each of a plurality of queries of the data set, each item of hashed information including a hash of a query and a hash of an expected result of executing the query using the server index; receiving, via the network, a query from a data requester to retrieve a set of data items from the data store and a hash of an expected result of executing the received query using the server index; generating a result of the received query for the data set based on the server index; and responsive to a comparison of a hash of the generated result, the received hash of the expected result, and the hashes of expected results in
    Type: Grant
    Filed: March 5, 2019
    Date of Patent: March 16, 2021
    Assignee: British Telecommunications Public Limited Company
    Inventors: Joshua Daniel, Gery Ducatel
  • Publication number: 20210071865
    Abstract: A system for flare combustion control includes a sound speed measurement device for measuring sound speed in a flare vent gas, and a flare combustion controller including a memory and a processor. The processor is configured to receive the measured sound speed and determine, based on the measured sound speed, a molecular weight of the flare vent gas. The processor is further configured to determine, based on the determined molecular weight, a net heating value of the flare vent gas, and adjust the net heating value of the flare vent gas by regulating an amount of a supplemental fuel gas in the flare vent gas.
    Type: Application
    Filed: August 17, 2020
    Publication date: March 11, 2021
    Inventors: Daniel Robert Johnson, Chong Tao, Joshua Daniel Brooks, Randy Scott Pfenninger, Lei Sui
  • Patent number: D916422
    Type: Grant
    Filed: November 16, 2018
    Date of Patent: April 13, 2021
    Assignee: GREEN OX PALLET TECHNOLOGY, LLC
    Inventors: Joshua Daniel Herbeck, Gregory D. Van de Mark
  • Patent number: D929758
    Type: Grant
    Filed: March 8, 2019
    Date of Patent: September 7, 2021
    Inventors: Brenton Hutchinson, Joshua Daniel Grothman-Pelton
  • Patent number: D930319
    Type: Grant
    Filed: January 20, 2021
    Date of Patent: September 7, 2021
    Assignee: GREEN OX PALLET TECHNOLOGY, LLC
    Inventors: Joshua Daniel Herbeck, Gregory D. Van de Mark