Patents by Inventor Joshua DANIEL
Joshua DANIEL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10961870Abstract: A method of cooling a portion of a gas turbine engine includes positioning a tie rod relative to an inner frame case. The tie rod includes a bushing opening and the inner frame case includes a fastener opening. A fastener is secured through the fastener opening in the inner frame case to a threaded bushing located in the bushing opening. The threaded bushing includes a distal end that forms a clearance gap with the inner frame case. Heat is transferred from the fastener through the threaded bushing to prevent the fastener from creeping.Type: GrantFiled: May 30, 2019Date of Patent: March 30, 2021Assignee: RAYTHEON TECHNOLOGIES CORPORATIONInventors: Joshua Daniel Winn, Alexander Broulidakis, Paul K. Sanchez, Anthony P Cherolis, Joseph J. Sedor, Christopher Treat
-
Publication number: 20210089670Abstract: A computer implemented method for access control for a restricted resource in a computer system, the method including receiving a first set of records for the computer system, each record detailing an occurrence in the computer system during a training time period when the resource is accessed in an approved manner; generating a sparse distributed representation of the set of records to form a training set for a hierarchical temporal memory (HTM); training the HTM based on the training set in order that the trained HTM provides a model of the operation of the computer system during the training time period; receiving a second set of records for the computer system, each record detailing an occurrence in the computer system during an operating time period for the computer system in use by a consumer of the resource; generating a sparse distributed representation of the second set of records to form an input set for the trained HTM; executing the trained HTM based on the input set to determine a degree of recogType: ApplicationFiled: March 26, 2018Publication date: March 25, 2021Applicant: British Telecommunications Public Limited CompanyInventors: Joshua Daniel, Xiaofeng Du
-
Publication number: 20210089650Abstract: A computer implemented method to detect a computer system in execution operating in a manner that is not compliant with a definition of a set of compliant operations, the method including receiving a first set of records for the computer system, each record detailing an occurrence in the computer system during a first predetermined time period; generating a sparse distributed representation of the set of records to form a training set for a hierarchical temporal memory (HTM); training the HTM based on the training set in order that the trained HTM provides a model of the operation of the computer system during the predetermined time period; selecting at least a subset of operations in the set of compliant operations and causing the invocation of each operation of the subset in the computer system over a second predetermined time period to generate a second set of records of occurrences in the computer system; generating a sparse distributed representation of the set of records to form an input set for the traType: ApplicationFiled: March 26, 2018Publication date: March 25, 2021Applicant: British Telecommunications Public Limited CompanyInventors: Joshua Daniel, Xiaofeng Du
-
Patent number: 10956614Abstract: A computer implemented method of a resource provider for access control for a restricted resource in a network connected computer system, wherein a blockchain data structure accessible via the network stores digitally signed records validated by network connected miner software components including a provider record associated with the resource provider, the method including: identifying an access control role definition for access to the resource, the role including a specification of access permissions; receiving a request from a resource consumer for access to the resource; communicating, to the resource consumer, an indication of a quantity of a cryptocurrency required for access to the resource; and in response to a determination that the required quantity of cryptocurrency is transferred to the provider record in the blockchain, the transfer being caused by a blockchain transaction including an identification of the role and the transaction being validated by a miner component, granting the consumer accType: GrantFiled: July 20, 2016Date of Patent: March 23, 2021Assignee: British Telecommunications Public Limited CompanyInventors: Joshua Daniel, Gery Ducatel, Theo Dimitrakos
-
Publication number: 20210083856Abstract: A computer implemented method of a secure computing component to provide access to a cryptographic key, the key being associated with the secure component by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, the method including receiving a request from another secure computing component to associate the key with the other component, the request having associated identification information for a requester of the key; responsive to a verification of an entitlement of the requester, generating a new record for storage in the blockchain, the new record associating the key with the other component and being validated by the miner components; and further responsive to the verification, securely transferring the key to the other component so as to provide access to the key to the key requester via the other component.Type: ApplicationFiled: June 11, 2018Publication date: March 18, 2021Applicant: British Telecommunications Public Limited CompanyInventor: Joshua DANIEL
-
Patent number: 10951708Abstract: A computer implemented method of a network connected data storage system, the method including receiving, via the network, and storing a data set including a plurality of data items encrypted using an index-based searchable encryption scheme, wherein the searchable encryption scheme has associated a server index and a client index; receiving, via the network, and storing a set of hashed information for each of a plurality of queries of the data set, each item of hashed information including a hash of a query and a hash of an expected result of executing the query using the server index; receiving, via the network, a query from a data requester to retrieve a set of data items from the data store and a hash of an expected result of executing the received query using the server index; generating a result of the received query for the data set based on the server index; and responsive to a comparison of a hash of the generated result, the received hash of the expected result, and the hashes of expected results inType: GrantFiled: March 5, 2019Date of Patent: March 16, 2021Assignee: British Telecommunications Public Limited CompanyInventors: Joshua Daniel, Gery Ducatel
-
Publication number: 20210071865Abstract: A system for flare combustion control includes a sound speed measurement device for measuring sound speed in a flare vent gas, and a flare combustion controller including a memory and a processor. The processor is configured to receive the measured sound speed and determine, based on the measured sound speed, a molecular weight of the flare vent gas. The processor is further configured to determine, based on the determined molecular weight, a net heating value of the flare vent gas, and adjust the net heating value of the flare vent gas by regulating an amount of a supplemental fuel gas in the flare vent gas.Type: ApplicationFiled: August 17, 2020Publication date: March 11, 2021Inventors: Daniel Robert Johnson, Chong Tao, Joshua Daniel Brooks, Randy Scott Pfenninger, Lei Sui
-
Publication number: 20210072036Abstract: A system includes a processor configured to receive requirement values, from a vehicle-providing entity, for a plurality of predefined tunable routing parameters. The processor is also configured to select and assign entity-associated, routing parameter consideration-levels, based on the values correlated to a predefined schema of consideration-levels for each parameter. The processor is further configured to receive a plurality of pick-up requests and determine, using the entity-associated routing parameter consideration-levels, a routing-plan for a plurality of vehicles to service the requests such that the received values are met.Type: ApplicationFiled: November 19, 2020Publication date: March 11, 2021Inventors: Huizhu Crystal WANG, Joshua Daniel LYON, Mohammad ABOUALI, Qianyi WANG
-
Patent number: 10936590Abstract: A centralized server, such as in a cloud environment, is provided generally connected to a plurality of clients that independently maintain data that is also maintained in the centralized server. The centralized server possessing an authoritative Bloom filter series comprising at least a plurality of Bloom filters each with successive Bloom filter entries that periodically provide and update a copy of the authoritative Bloom filter series at each of the clients. Each client checks to see if a data file is present locally by searching for a corresponding Bloom filter entry in the copy of the Bloom filter series before seeking the data file in the centralized server.Type: GrantFiled: May 30, 2018Date of Patent: March 2, 2021Assignee: Spectra Logic CorporationInventor: Joshua Daniel Carter
-
Patent number: 10938838Abstract: An automated system attempts to characterize code as safe or unsafe. For intermediate code samples not placed with sufficient confidence in either category, human-readable analysis is automatically generated to assist a human reviewer in reaching a final disposition. For example, a random forest over human-interpretable features may be created and used to identify suspicious features in a manner that is understandable to, and actionable by, a human reviewer. Similarly, a k-nearest neighbor algorithm may be used to identify similar samples of known safe and unsafe code based on a model for, e.g., a file path, a URL, an executable, and so forth. Similar code may then be displayed (with other information) to a user for evaluation in a user interface. This comparative information can improve the speed and accuracy of human interventions by providing richer context for human review of potential threats.Type: GrantFiled: September 12, 2018Date of Patent: March 2, 2021Assignee: Sophos LimitedInventors: Joshua Daniel Saxe, Andrew J. Thomas, Russell Humphries, Simon Neil Reed, Kenneth D. Ray, Joseph H. Levy
-
Publication number: 20210043525Abstract: Some embodiments include apparatuses and methods of fabricating the apparatuses. One of the apparatuses includes a substrate of a semiconductor die; a memory cell portion located over a first portion of the substrate; a conductive pad portion located over a second portion of the substrate and outside the memory cell portion; and a sensor circuit including a portion located over the second portion of the substrate and under the conductive pad portion. The conductive pad portion includes conductive pads. Each of the conductive pads is part of a respective electrical path coupled to a conductive contact of a base outside the substrate.Type: ApplicationFiled: August 8, 2019Publication date: February 11, 2021Inventors: Chiara Cerafogli, Kenneth William Marr, Brian J. Soderling, Michael P. Violette, Joshua Daniel Tomayer, James E. Davis
-
Patent number: 10909324Abstract: Methods and devices for story detection in text are provided. A device can include an input device for receiving text data a processor configured to: tokenize each paragraph in the text data and split each tokenized paragraph into sentences; parse each sentence from the tokenized paragraphs; label each predicate in each sentence with its respective semantic role; and assign a verb class to each predicate; and determine whether respective arguments of each predicate contains a character. The device can further include a support vector machine configured to determine whether a story is present within each paragraph based upon whether each predicate contains a character.Type: GrantFiled: January 29, 2019Date of Patent: February 2, 2021Assignee: The Florida International University Board of TrusteesInventors: Joshua Daniel Eisenberg, Mark Finlayson
-
Publication number: 20210029123Abstract: A computer implemented method of controlling access to a digital asset specifying how an artefact is to be rendered, the method including receiving the digital asset and an indication of a first transaction in a decentralized sequential transactional database; verifying the digital asset by evaluating a digital hash of the asset to compare with a hash stored in the first transaction and, responsive to the verification, securely storing the digital asset; generating a second transaction in the database to indicate the availability of the digital asset for rendering the artefact; receiving a request to access the digital asset by a requesting renderer, the request including an indication of a third transaction in the database; accessing the third transaction and responsive to a determination that the third transaction indicates that the requesting renderer is authorized to access the digital asset for rendering the artefact, securely communicating the digital asset to the requesting renderer.Type: ApplicationFiled: November 20, 2018Publication date: January 28, 2021Inventors: Iain MONTEATH, Joshua DANIEL, Jonathan TATE
-
Patent number: 10896256Abstract: Apparatus and methods describe herein, for example, a process that can include receiving a potentially malicious file, and dividing the potentially malicious file into a set of byte windows. The process can include calculating at least one attribute associated with each byte window from the set of byte windows for the potentially malicious file. In such an instance, the at least one attribute is not dependent on an order of bytes in the potentially malicious file. The process can further include identifying a probability that the potentially malicious file is malicious, based at least in part on the at least one attribute and a trained threat model.Type: GrantFiled: May 17, 2019Date of Patent: January 19, 2021Assignee: Invincea, Inc.Inventors: Joshua Daniel Saxe, Konstantin Berlin
-
Patent number: 10891383Abstract: A computer implemented method for validating use of a computing resource by a requester software component including: validating a characteristic of the requester; generating a first transaction defining criteria for consumption of the resource by the requester, the first transaction being encrypted with a private key from a public key/private key pair and being added as part of a block of transactions to a blockchain data structure; generating a subsequent encrypted transaction corresponding to a request of the requester to consume the resource, the subsequent transaction referring to the first transaction, wherein the subsequent transaction is validated by a transaction miner computing component from a plurality of miners by authenticating the transaction using the public key and verifying compliance with the criteria defined in each transaction.Type: GrantFiled: February 10, 2016Date of Patent: January 12, 2021Assignee: British Telecommunications Public Limited CompanyInventors: Joshua Daniel, Theo Dimitrakos, Gery Ducatel
-
Publication number: 20200409719Abstract: A computer implemented method to execute a software application in a network attached computing environment, the application being defined by a set of required software services to constitute the application, the required services being selected from services indicated in a component registry, the method including recording a block to a blockchain data structure, the new block identifying at least a subset of the set of required services; receiving one or more further blocks from the blockchain data structure, each of the further blocks referencing a service provider for providing one or more of the required services; and selecting one or more service providers identified in the blockchain and defining a specification for an application assembler component to assemble the software application, the specification identifying selected service providers.Type: ApplicationFiled: March 3, 2017Publication date: December 31, 2020Applicant: British Telecommunications Public Limited CompanyInventors: Joshua DANIEL, Gery DUCATEL
-
Patent number: 10878093Abstract: In some embodiments, a processor can receive an input string associated with a potentially malicious artifact and convert each character in the input string into a vector of values to define a character matrix. The processor can apply a convolution matrix to a first window of the character matrix to define a first subscore, apply the convolution matrix to a second window of the character matrix to define a second subscore and combine the first subscore and the second subscore to define a score for the convolution matrix. The processor can provide the score for the convolution matrix as an input to a machine learning threat model, identify the potentially malicious artifact as malicious based on an output of the machine learning threat model, and perform a remedial action on the potentially malicious artifact based on identifying the potentially malicious artifact as malicious.Type: GrantFiled: May 29, 2019Date of Patent: December 29, 2020Assignee: Invincea, Inc.Inventor: Joshua Daniel Saxe
-
Publication number: 20200393864Abstract: A device includes an energy unit coupled to an energy device and adapted to couple a pair of split DC rails. A controller senses the voltage on the DC rails and regulates its output current response by means of an autonomous current response that creates the aggregate effect of controlling the rail voltage in cooperation with other units coupled to the DC rails. A system includes multiple such devices coupled to split DC rails.Type: ApplicationFiled: June 29, 2020Publication date: December 17, 2020Inventors: Joshua Daniel Kaufman, Benjamin Francis Polito, Keith Thomas Richtman
-
Patent number: 10853141Abstract: A computer implemented method to provide a resource to a virtualized software installation in a distributed computing environment, the method including: receiving a functional requirement for the software installation; determining an extent of the resource required to implement the functional requirement; identifying one or more resource providers in the distributed computing environment having availability of the required resource to the determined extent; and communicating an indication of the identified resource providers to the software installation in order that the resource can be provided to the software installation to the determined extent to provide the functional requirement.Type: GrantFiled: May 23, 2016Date of Patent: December 1, 2020Assignee: British Telecommunications Public Limited CompanyInventors: Fadi El-Moussa, Joshua Daniel
-
Patent number: D909005Type: GrantFiled: March 18, 2019Date of Patent: January 26, 2021Assignee: GREEN OX PALLET TECHNOLOGY, LLCInventors: Joshua Daniel Herbeck, Gregory D. Van de Mark