Patents by Inventor Keith Stewart

Keith Stewart has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11972442
    Abstract: Techniques and embodiments are described herein for detecting and mitigating fraudulent activity within user experience (UX) test applications. In some embodiments, a system applies a set of rules and/or machine learning (ML) models to each respondent of an online survey or UX test. Different ML models may be trained to learn domain-specific patterns indicative of fraudulent activity. The system may then select the ML models based on attributes of the UX test and/or respondent. The selected rules and/or ML models may generate a probabilistic score representing a likelihood that the respondent is currently engaging in or will engage in fraudulent activity with respect to a UX test. If the score exceeds a threshold, then the system may take action to mitigate the fraudulent activity, such as triggering the removal of the user from an accepted respondent pool, halting further engagement between the respondent and the UX test, and generating alerts.
    Type: Grant
    Filed: February 17, 2023
    Date of Patent: April 30, 2024
    Assignee: Wevo, Inc.
    Inventors: Dustin Garvey, Shannon Walsh, Frank Chiang, Janet Muto, Nitzan Shaer, Hannah Sieber, Charlie Hoang, Alexa Stewart, Keith Horvath, Marshall McCready, Laurie Delaney, Jon Andrews
  • Patent number: 11876817
    Abstract: A system and a method for modeling queue-based message-oriented middleware (MoM) are provided. The method commences with connecting with a MoM system and converting information associated with the MoM system into a standardized object model. The standardized object model may include a queue-based node, at least one producer application, and at least one consumer application. The at least one producer application provides a message to the queue-based node. The at least one consumer application receives the message from the queue-based node. The message persists in the queue until consumed by the at least one consumer application. The method continues with generating a standardized graph of relationships between a producer and a consumer over a period of time. The method further includes creating a policy, periodically analyzing the standardized graph for at least one deviation from the policy, and issuing an alert in response to detecting the at least one deviation.
    Type: Grant
    Filed: December 23, 2020
    Date of Patent: January 16, 2024
    Assignee: vArmour Networks, Inc.
    Inventors: Colin Ross, Marc Woolward, Keith Stewart
  • Patent number: 11866789
    Abstract: Various embodiments provide compositions and methods for detecting cancers containing an NRG1 fusion event and treating a patient with a therapeutic agent that is targeted to the NRG1 fusion. Exemplary compositions for treating cancers containing the NRG1 fusion may comprise therapeutic agents inhibiting Epidermal Growth Factor Receptor and/or ERBB2 such as cetuximab, panitumumab, Sym004, MM-151, mAb 806, mAb 528, MEHD794A, gefitinib, erlotinib, lapatinib, afatinib, PD153035, AG1478, trastuzumab, and pertuzumab. In some embodiments, the therapeutic agent may be a combination of trastuzumab, and pertuzumab.
    Type: Grant
    Filed: August 25, 2021
    Date of Patent: January 9, 2024
    Assignee: The Translational Genomics Research Institute
    Inventors: Sara Byron, Jessica Aldrich, John Carpten, David Craig, Mitesh Borad, Alan Bryce, Michael Barrett, George Vasmatzis, Keith Stewart
  • Patent number: 11863580
    Abstract: Methods and systems for managing security in a cloud computing environment are provided. Exemplary methods include: gathering data about workloads and applications in the cloud computing environment; updating a graph database using the data, the graph database representing the workloads of the cloud computing environment as nodes and relationships between the workloads as edges; receiving a security template, the security template logically describing targets in the cloud computing environment to be protected and how to protect the targets; creating a security policy using the security template and information in the graph database; and deploying the security policy in the cloud computing environment.
    Type: Grant
    Filed: December 23, 2020
    Date of Patent: January 2, 2024
    Assignee: vArmour Networks, Inc.
    Inventors: Colin Ross, Marc Woolward, Keith Stewart
  • Patent number: 11818152
    Abstract: A system and a method for modeling topic-based message-oriented middleware (MoM) are provided. The method commences with connecting with a MoM system and converting information associated with the MoM system into a standardized object model. The standardized object model may include a topic-based node associated with a topic, at least one producer application, and at least one consumer application. The at least one producer application provides one or more messages related to the topic to the topic-based node. The at least one consumer application receives the one or more messages from the topic-based node. The method continues with generating a standardized graph of relationships between producers and consumers over a period of time. The method further includes creating a policy, periodically analyzing the standardized graph for at least one deviation from the policy, and issuing an alert in response to detecting the at least one deviation.
    Type: Grant
    Filed: December 23, 2020
    Date of Patent: November 14, 2023
    Assignee: vArmour Networks, Inc.
    Inventors: Colin Ross, Marc Woolward, Keith Stewart
  • Patent number: 11777978
    Abstract: Systems and methods for assessing an application access risk are provided. An example method commences with collecting data concerning relationships between an application, one or more client devices, and one or more users in a computing environment. The method includes updating a graph database including nodes and edges. The nodes represent the application, the one or more client devices, and the one or more users and the edges represent relationships between the application, the one or more client devices, and the one or more users. The method continues with enriching the graph database by associating the nodes with metadata including information concerning the one or more users accessing the application from the one or more client devices. The method further includes analyzing the graph database to identify a subset of nodes used to access the application and displaying a graphical representation of the subset of nodes.
    Type: Grant
    Filed: January 29, 2021
    Date of Patent: October 3, 2023
    Assignee: vArmour Networks, Inc.
    Inventors: Paul Bigbee, Marc Woolward, Hsisheng Wang, Keith Stewart, Jason Parry
  • Patent number: 11711374
    Abstract: Methods and systems for understanding identity and organizational access to applications within an enterprise environment are provided.
    Type: Grant
    Filed: February 8, 2021
    Date of Patent: July 25, 2023
    Assignee: vArmour Networks, Inc.
    Inventors: Colin Ross, Marc Woolward, Keith Stewart, Paul Bigbee, Hsisheng Wang
  • Patent number: 11575563
    Abstract: Methods and systems for managing security in a cloud computing environment are provided. Exemplary methods include: gathering data about workloads and applications in the cloud computing environment; updating a graph database using the data, the graph database representing the workloads of the cloud computing environment as nodes and relationships between the workloads as edges; receiving a security template, the security template logically describing targets in the cloud computing environment to be protected and how to protect the targets; creating a security policy using the security template and information in the graph database; and deploying the security policy in the cloud computing environment.
    Type: Grant
    Filed: May 31, 2019
    Date of Patent: February 7, 2023
    Assignee: vArmour Networks, Inc.
    Inventors: Marc Woolward, Keith Stewart, Timothy Eades, Meng Xu, Myo Zarny, Matthew M. Williamson, Jason Parry, Hong Xiao, Hsisheng Wang, Cheng-Lin Hou
  • Patent number: 11473611
    Abstract: A locking nut system includes a threaded member with a first threaded area having a first thread direction and a second threaded area having a second thread direction opposite the first thread direction in which a plurality of crests extend across the first and second threaded areas with a constant pitch between the crests such that minimal material is removed, structural integrity is maintained, and a first nut secures the threaded member to a workpiece and a second opposing nut renders the first nut stationary.
    Type: Grant
    Filed: June 18, 2020
    Date of Patent: October 18, 2022
    Inventor: Keith Stewart
  • Publication number: 20220247774
    Abstract: Systems and methods for assessing an application access risk are provided. An example method commences with collecting data concerning relationships between an application, one or more client devices, and one or more users in a computing environment. The method includes updating a graph database including nodes and edges. The nodes represent the application, the one or more client devices, and the one or more users and the edges represent relationships between the application, the one or more client devices, and the one or more users. The method continues with enriching the graph database by associating the nodes with metadata including information concerning the one or more users accessing the application from the one or more client devices. The method further includes analyzing the graph database to identify a subset of nodes used to access the application and displaying a graphical representation of the subset of nodes.
    Type: Application
    Filed: January 29, 2021
    Publication date: August 4, 2022
    Inventors: Paul Bigbee, Marc Woolward, Hsi-Sheng Wang, Keith Stewart, Jason Parry
  • Publication number: 20220245256
    Abstract: Systems and methods for attributing user behavior from multiple technical telemetry sources are provided. An example method includes determining that the user has logged into the computing device, in response of the determination, collecting log data from a plurality of telemetry sources associated with the computing device, extracting, from the log data, activity data concerning activities of the computing device, analyzing the activity data to determine that the activity data are attributed to the user, generating, based on the activity data, behavior attributes of the user, associating the behavior attributes with a unique identifier of the computing device, and estimating security integrity of the computing device based on a comparison of the behavior attributes to reference behavior attributes. The reference behavior attributes include further behavior attributes determined using log data of at least one further computing device associated with the user.
    Type: Application
    Filed: January 29, 2021
    Publication date: August 4, 2022
    Inventors: Hsi-Sheng Wang, Paul Bigbee, Marc Woolward, Keith Stewart, Meng Xu
  • Publication number: 20220201024
    Abstract: A system and a method for modeling topic-based message-oriented middleware (MoM) are provided. The method commences with connecting with a MoM system and converting information associated with the MoM system into a standardized object model. The standardized object model may include a topic-based node associated with a topic, at least one producer application, and at least one consumer application. The at least one producer application provides one or more messages related to the topic to the topic-based node. The at least one consumer application receives the one or more messages from the topic-based node. The method continues with generating a standardized graph of relationships between producers and consumers over a period of time. The method further includes creating a policy, periodically analyzing the standardized graph for at least one deviation from the policy, and issuing an alert in response to detecting the at least one deviation.
    Type: Application
    Filed: December 23, 2020
    Publication date: June 23, 2022
    Inventors: Colin Ross, Marc Woolward, Keith Stewart
  • Publication number: 20220201025
    Abstract: A system and a method for modeling queue-based message-oriented middleware (MoM) are provided. The method commences with connecting with a MoM system and converting information associated with the MoM system into a standardized object model. The standardized object model may include a queue-based node, at least one producer application, and at least one consumer application. The at least one producer application provides a message to the queue-based node. The at least one consumer application receives the message from the queue-based node. The message persists in the queue until consumed by the at least one consumer application. The method continues with generating a standardized graph of relationships between a producer and a consumer over a period of time. The method further includes creating a policy, periodically analyzing the standardized graph for at least one deviation from the policy, and issuing an alert in response to detecting the at least one deviation.
    Type: Application
    Filed: December 23, 2020
    Publication date: June 23, 2022
    Inventors: Colin Ross, Marc Woolward, Keith Stewart
  • Patent number: 11310284
    Abstract: Methods and systems for validating security policy in a cloud computing environment are provided. An example method includes providing a graph database, the graph database representing workloads of the cloud computing environment as nodes and relationships between the workloads as edges, receiving a security policy, the security policy logically describing rules for the relationships between the workloads, determining, based on the security policy and the graph database, a list of violations, the list of violations including at least one relationship from the relationships between the workloads in the graph database, the at least one relationship being not allowed by at least one of the rules in the security policy, and providing the list of violations to a user.
    Type: Grant
    Filed: May 31, 2019
    Date of Patent: April 19, 2022
    Assignee: vArmour Networks, Inc.
    Inventors: Marc Woolward, Meng Xu, Hong Xiao, Keith Stewart, Matthew M. Williamson
  • Patent number: 11290493
    Abstract: Methods and systems for managing security in a cloud computing environment are provided. Exemplary methods include: receiving a target, the target specifying workloads of a plurality of workloads to be included in the security policy, the plurality of workloads being associated with the cloud computing environment; identifying nodes and edges in the graph database using the target, the graph database representing the plurality of workloads as nodes and relationships between the plurality of workloads as edges; getting a security intent, the security intent including a high-level security objective in a natural language; obtaining a security template associated with the security intent; and applying the security template to the identified nodes and edges to produce security rules for the security policy, the security rules at least one of allowing and denying communications between the target and other workloads of the plurality of workloads.
    Type: Grant
    Filed: May 31, 2019
    Date of Patent: March 29, 2022
    Assignee: vArmour Networks, Inc.
    Inventors: Marc Woolward, Meng Xu, Hong Xiao, Keith Stewart, Matthew M. Williamson
  • Publication number: 20220042112
    Abstract: Various embodiments provide compositions and methods for detecting cancers containing an NRG1 fusion event and treating a patient with a therapeutic agent that is targeted to the NRG1 fusion. Exemplary compositions for treating cancers containing the NRG1 fusion may comprise therapeutic agents inhibiting Epidermal Growth Factor Receptor and/or ERBB2 such as cetuximab, panitumumab, Sym004, MM-151, mAb 806, mAb 528, MEHD794A, gefitinib, erlotinib, lapatinib, afatinib, PD153035, AG1478, trastuzumab, and pertuzumab. In some embodiments, the therapeutic agent may be a combination of trastuzumab, and pertuzumab.
    Type: Application
    Filed: August 25, 2021
    Publication date: February 10, 2022
    Applicants: THE TRANSLATIONAL GENOMICS RESEARCH INSTITUTE, MAYO FOUNDATION FOR MEDICAL EDUCATION AND RESEARCH
    Inventors: Sara Byron, Jessica Aldrich, John Carpten, David Craig, Mitesh Borad, Alan Bryce, Michael Barrett, George Vasmatzis, Keith Stewart
  • Publication number: 20210396267
    Abstract: A locking nut system includes a threaded member with a first threaded area having a first thread direction and a second threaded area having a second thread direction opposite the first thread direction in which a plurality of crests extend across the first and second threaded areas with a constant pitch between the crests such that minimal material is removed, structural integrity is maintained, and a first nut secures the threaded member to a workpiece and a second opposing nut renders the first nut stationary.
    Type: Application
    Filed: June 18, 2020
    Publication date: December 23, 2021
    Inventor: Keith Stewart
  • Patent number: 11186875
    Abstract: Various embodiments provide compositions and methods for detecting cancers containing an NRG1 fusion event and treating a patient with a therapeutic agent that is targeted to the NRG1 fusion. Exemplary compositions for treating cancers containing the NRG1 fusion may comprise therapeutic agents inhibiting Epidermal Growth Factor Receptor and/or ERBB2 such as cetuximab, panitumumab, Sym004, MM-151, mAb 806, mAb 528, MEHD794A, gefitinib, erlotinib, lapatinib, afatinib, PD153035, AG1478, trastuzumab, and pertuzumab. In some embodiments, the therapeutic agent may be a combination of trastuzumab, and pertuzumab.
    Type: Grant
    Filed: June 13, 2016
    Date of Patent: November 30, 2021
    Assignees: The Translational Genomics Research Institute, Mayo Foundation for Medical Education and Research
    Inventors: John Carpten, David Craig, Sara Byron, Jessica Aldrich, Mitesh Borad, Alan Bryce, Michael Barrett, George Vasmatzis, Keith Stewart
  • Publication number: 20210168150
    Abstract: Methods and systems for understanding identity and organizational access to applications within an enterprise environment are provided.
    Type: Application
    Filed: February 8, 2021
    Publication date: June 3, 2021
    Inventors: Colin Ross, Marc Woolward, Keith Stewart, Paul Bigbee, Hsi-Sheng Wang
  • Publication number: 20210120029
    Abstract: Methods and systems for managing security in a cloud computing environment are provided. Exemplary methods include: gathering data about workloads and applications in the cloud computing environment; updating a graph database using the data, the graph database representing the workloads of the cloud computing environment as nodes and relationships between the workloads as edges; receiving a security template, the security template logically describing targets in the cloud computing environment to be protected and how to protect the targets; creating a security policy using the security template and information in the graph database; and deploying the security policy in the cloud computing environment.
    Type: Application
    Filed: December 23, 2020
    Publication date: April 22, 2021
    Inventors: Colin Ross, Marc Woolward, Keith Stewart