Patents by Inventor Joshua MCCARTHY

Joshua MCCARTHY has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11970795
    Abstract: Methods of manufacturing multi-material fibers having one or more electrically-connectable devices disposed therein are described. In certain instances, the methods include the steps of: positioning the electrically-connectable device(s) within a corresponding pocket provided in a preform material; positioning a first electrical conductor longitudinally within a first conduit provided in the preform material; and drawing the multi-material fiber by causing the preform material to flow, such that the first electrical conductor extends within the multi-material fiber along a longitudinal axis thereof and makes an electrical contact with a first electrode located on each electrically-connectable device. A metallurgical bond may be formed between the first electrical conductor and the first electrode while drawing the multi-material fiber and/or, after drawing the multi-material fiber, the first electrical conductor may be located substantially along a neutral axis of the multi-material fiber.
    Type: Grant
    Filed: April 21, 2021
    Date of Patent: April 30, 2024
    Assignee: Advanced Functional Fabrics of America, Inc.
    Inventors: Chia-Chun Chung, Jason Cox, Joshua Deisenhaus, Kristina McCarthy, Kristen Mulherin, Jimmy Nguyen, Michael Rein
  • Publication number: 20240123774
    Abstract: An aerodynamic system comprising a torsion tube, a first rotatory coupling coupled to the torsion tube and adapted to mount to a first wheel hub, a second rotary coupling coupled to the torsion tube distal from the first rotary coupling and adapted to mount to a second wheel hub, and a non-rotating fairing panel mounted to the torsion tube.
    Type: Application
    Filed: December 22, 2023
    Publication date: April 18, 2024
    Inventors: Joshua Butler, Kyle Walker, Redza Shah, Zane McCarthy, Michael O'Connell, Aaron McGraw
  • Patent number: 11932060
    Abstract: A chassis mounted energy extraction and delivery system. In one embodiment, a gravity-referenced, external tire inflation facility is integrated into an aerodynamic fairing mounted on the chassis of a vehicle. In one other embodiment, a torsion bar coupled between a hub-mounted energy extraction or delivery facility and a selected portion of the chassis provides a cross-referenced fixed point of reference. In a dual-axle embodiment, a first end of the torsion bar is coupled to the hub of one axle and a second end of the torsion bar is coupled to the hub of the other axle. In a single-axle embodiment, the second end of the torsion bar is coupled to the chassis.
    Type: Grant
    Filed: November 6, 2017
    Date of Patent: March 19, 2024
    Assignee: FLOWBELOW AERO, INC.
    Inventors: Joshua Butler, Kyle Walker, Redza Shah, Zane McCarthy, Michael O'Connell, Aaron McGraw
  • Patent number: 11914342
    Abstract: A method, medium, and system including determining a material property value to assign to each of the plurality of 3D volume elements, wherein the material property values assigned to the plurality of 3D volume elements are classified into a predetermined number of bins that correspond to a plurality of different additive manufacturing (AM) print parameter sets, generating a plurality of transfer functions to determine relationships between the material property values assigned to the plurality of 3D volume elements and a plurality of desired AM print parameter sets, automatically determining, based on the plurality of transfer functions, an assignment of one of the plurality of different AM print parameter sets to each of the plurality of 3D volume elements, and validating the determined assignments of the plurality of different AM print parameter sets for the plurality of 3D volume elements based on the plurality of transfer functions.
    Type: Grant
    Filed: October 19, 2021
    Date of Patent: February 27, 2024
    Assignee: General Electric Company
    Inventors: Arvind Rangarajan, Christina Margaret Vasil, Joshua Mook, Anthony J. Vinciquerra, Brian McCarthy, Vipul Kumar Gupta
  • Publication number: 20230421582
    Abstract: Disclosed techniques include cybersecurity operations case triage groupings. A plurality of network-connected cybersecurity threat protection applications is accessed. A plurality of inputs is received from the cybersecurity threat protection applications. The plurality of inputs is initiated by one or more cybersecurity events. A computer platform is used to analyze metadata associated with the plurality of inputs from the cybersecurity threat protection applications. The analyzing is based on parsing incoming traffic alerts from the cybersecurity threat protection applications. The inputs are triaged into groupings, based on the metadata. The triaging determines commonality of threats among the plurality of inputs. The groupings are based on a number of users experiencing the plurality of inputs. The number of users is matched against a threshold for the plurality of inputs and a particular grouping. A cybersecurity threat response is generated, based on the groupings.
    Type: Application
    Filed: September 8, 2023
    Publication date: December 28, 2023
    Applicant: Revelstoke Security, Inc.
    Inventors: Joshua McCarthy, David B McKinley, Lance Rund
  • Publication number: 20230334388
    Abstract: Disclosed techniques include cybersecurity operations center load balancing. A cybersecurity security operations center (SOC) caseload history is accessed. Triage results from the SOC caseload history are analyzed on a computer platform to produce an analyst threat response profile. The analyst threat response profile is augmented with threat response resolution metrics. The threat response resolution metrics are updated with a subjective rating. The subjective rating is supplied by management, peers, or machine learning. Notification of a new cybersecurity threat is received across a cybersecurity network by the SOC. The new cybersecurity threat is assigned to a specific analyst, based on the augmented analyst threat response profile. The assigning is further based on weighting of threat severity, threat complexity, and analyst availability. An existing SOC caseload is reassigned to increase availability of the specific analyst.
    Type: Application
    Filed: June 9, 2023
    Publication date: October 19, 2023
    Applicant: Revelstoke Security, Inc.
    Inventors: Joshua McCarthy, David B McKinley, Lance Rund
  • Publication number: 20230252138
    Abstract: Disclosed techniques include cybersecurity workflow management using autodetection. A cybersecurity threat protection workflow is accessed. At least one cybersecurity threat protection application notification is received. The cybersecurity threat protection application notification causes an irreversible action to be scheduled by the workflow. The irreversible action comprises a destructive response. The destructive response includes killing a process, deleting an account, shutting down a computer, wiping a computer, or shutting down a router. The irreversible action is detected before it is implemented by the workflow. The irreversible action in the workflow is mitigated using a supervisory workflow element. The mitigating the irreversible action comprises initiating a machine learning algorithm. The machine learning algorithm enables a near real-time response. The machine learning algorithm self-triggers the actionable response.
    Type: Application
    Filed: April 5, 2023
    Publication date: August 10, 2023
    Applicant: Revelstoke Security, Inc.
    Inventors: Joshua McCarthy, David B. McKinley, Lance Rund
  • Publication number: 20230156020
    Abstract: Disclosed techniques include integrated cybersecurity state change buffer service. A plurality of network-connected cybersecurity threat protection applications is accessed. A background synchronization service is initiated. The background synchronization service receives status from at least one of the plurality of cybersecurity threat protection applications. The status comprises high-volume incoming status data. The status is monitored, using the background synchronization service. A real-time state change in the status is identified, based on the monitoring. The identifying a real-time state change includes quantifying incoming data associated with the status. An actionable response is triggered, based on the state change that was identified. The actionable response enables self-healing of a connected security orchestration, automation, and response (SOAR) application system. The status is processed, using the background synchronization service, to provide the actionable response.
    Type: Application
    Filed: January 6, 2023
    Publication date: May 18, 2023
    Applicant: Revelstoke Security, Inc.
    Inventors: Joshua McCarthy, Nicholas Graves, David B McKinley, William Wilson
  • Publication number: 20230068946
    Abstract: Disclosed techniques include integrated cybersecurity threat management. A plurality of network-connected cybersecurity threat protection applications is accessed. A plurality of heterogeneous log files is ingested, wherein the log files are generated by at least two of the cybersecurity threat protection applications. The plurality of heterogeneous log files that were ingested is evaluated to enable identification of cybersecurity threat protection application capabilities. Each of the plurality of log files is sorted. The sorting enables identification of cybersecurity threat protection elements among the plurality of log files. The cybersecurity threat protection elements that were identified are integrated. The integrated cybersecurity threat protection elements are evaluated. At least one response for cybersecurity threat management is generated, based on a result of the evaluating. The response is provided to a cybersecurity threat management entity.
    Type: Application
    Filed: October 31, 2022
    Publication date: March 2, 2023
    Applicant: Revelstoke Security, Inc.
    Inventors: Joshua McCarthy, Romans Bermans, David B. McKinley
  • Publication number: 20220405401
    Abstract: Disclosed techniques include cybersecurity threat management using impact scoring. A plurality of cybersecurity threat protection applications is accessed. A first cybersecurity threat notification is received from one of the plurality of cybersecurity threat protection applications. An impact score is dynamically assigned to the first cybersecurity threat notification, wherein the assigning an impact score is based on information about a device for which the first cybersecurity threat notification was received. The impact score is weighted based on an evaluation of a user of the device for which the first cybersecurity threat notification was received. The weighting is further based on evaluation of device owners and evaluation of an asset. The information about a device and information about one or more users of the device comprise impact score metadata. The first cybersecurity threat notification is responded to, based on the impact score. The dynamically assigning includes the impact score metadata.
    Type: Application
    Filed: August 18, 2022
    Publication date: December 22, 2022
    Applicant: Revelstoke Security, Inc.
    Inventors: Joshua McCarthy, Romans Bermans, David B McKinley
  • Publication number: 20220385687
    Abstract: Disclosed techniques include cybersecurity threat management using element mapping. A plurality of cybersecurity threat protection applications is accessed. The cybersecurity threat protection applications include at least two different data management schemas. A first mapping of each of the plurality of cybersecurity threat protection applications is integrated. The first mapping includes a transformation of outputs of each of the plurality of cybersecurity threat protection applications. A second mapping of each of the plurality of cybersecurity threat protection applications is integrated. The second mapping includes a transformation of inputs of each of the plurality of cybersecurity threat protection applications. Cybersecurity is managed for a data network, based on data collected through the first mapping and data transmitted through the second mapping. The integrating a first mapping and a second mapping comprises a universal data layer for cybersecurity management.
    Type: Application
    Filed: May 26, 2022
    Publication date: December 1, 2022
    Applicant: Revelstoke Security, Inc.
    Inventors: David B McKinley, Romans Bermans, Joshua McCarthy
  • Publication number: 20220143295
    Abstract: A pinch valve mechanism for use in a suction/irrigator device, wherein the device has a conduit for suction/irrigation. The pinch valve mechanism includes a first end having a first projection, a second end, operatively connected to the first end and a second projection. A spring means operatively connected to the second end, wherein the conduit is disposed between the first end and the second end such that the first projection and second projection are biased to pinch the conduit into a closed position. Compression of the spring means moves the first end away from the second end to move the conduit into an open position.
    Type: Application
    Filed: February 14, 2020
    Publication date: May 12, 2022
    Applicant: Multigate Medical Products Pty Ltd
    Inventors: Amy LEEDHAM, Zongyun REN, Joshua MCCARTHY, Mark SPAILE, Shirley LIU