Patents by Inventor Mark Tucker

Mark Tucker has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240122947
    Abstract: There is disclosed a composition comprising cannabidiol (CBD) and one or more cannabinoids selected from cannabidiolic acid (CBDA), cannabigerol (CBG) and cannabigerolic acid (CBGA) for use in the treatment or prevention of inflammation and disorders associated with inflammation or an IL-6 related disorder.
    Type: Application
    Filed: February 8, 2022
    Publication date: April 18, 2024
    Applicants: TTS Pharma Ltd, Aberystwyth University
    Inventors: Robert WALTON, Mark TUCKER, Debbie NASH, Nathan ALLEN, Ruth WONFOR, Ifat SHAH
  • Patent number: 9887984
    Abstract: Secure electronic access may be provided by receiving at least one electronic certificate from an electronic device seeking to access a secure resource at a device under protection including at least one security processor, the at least one certificate providing device information related to the security of the electronic device, and comparing with at least one autonomous processor of an autonomous system the device information to the security requirement information. The at least one autonomous processor may instruct the at least one security processor to provide the secure resource to the device when the device information meets the security requirement information. The device under protection may provide the secure resource to the electronic device in response to the instruction.
    Type: Grant
    Filed: November 11, 2015
    Date of Patent: February 6, 2018
    Assignee: TEMPORAL DEFENSE SYSTEMS, LLC
    Inventors: Ronald Lance Justin, Charles Elden, Jared Karro, Mark Tucker
  • Patent number: 9769192
    Abstract: A system may be broken down into one or more components. Each of the components may be evaluated to ascribe a security score to each of the components. A composite security score may be generated for the system based on the security scores and a rate of decay measure characterizing a probabilistic security degradation of the system. The rate of decay measure may be applied to the composite security score to obtain a current composite security score.
    Type: Grant
    Filed: February 27, 2015
    Date of Patent: September 19, 2017
    Assignee: TEMPORAL DEFENSE SYSTEMS, LLC
    Inventors: Mark Tucker, Charles Elden, Jared Karro
  • Publication number: 20160308889
    Abstract: Systems and methods described herein may detect hardware modifications. A test loop may terminate at a transmit pin and a receiver pin of a processor footprint pad. A processor may be coupled to the test loop via the transmit pin and the receiver pin. The processor may cause a signal to be transmitted to the test loop from the transmit pin and receive a modified signal from the test loop at the receiver pin. The processor may analyze the modified signal to detect a hardware modification in communication with the test loop based on the modified signal.
    Type: Application
    Filed: April 15, 2016
    Publication date: October 20, 2016
    Inventors: Ronald Lance Justin, Charles Elden, Jared Karro, Mark Tucker
  • Publication number: 20160219079
    Abstract: A system for autonomous enforcement of rules may comprise a protected system, including infrastructure, operative in response to input signals and an autonomous control system. The autonomous control system may include a monitor circuit which is coupled to the input signals to monitor the input signals for violations of the rules and an action circuit coupled to the protected system which prevents the violating input signals from affecting the protected system.
    Type: Application
    Filed: November 5, 2015
    Publication date: July 28, 2016
    Inventors: Ronald Lance JUSTIN, Charles ELDEN, Jared KARRO, Mark TUCKER
  • Publication number: 20160149900
    Abstract: Secure electronic access may be provided by receiving at least one electronic certificate from an electronic device seeking to access a secure resource at a device under protection including at least one security processor, the at least one certificate providing device information related to the security of the electronic device, and comparing with at least one autonomous processor of an autonomous system the device information to the security requirement information. The at least one autonomous processor may instruct the at least one security processor to provide the secure resource to the device when the device information meets the security requirement information. The device under protection may provide the secure resource to the electronic device in response to the instruction.
    Type: Application
    Filed: November 11, 2015
    Publication date: May 26, 2016
    Inventors: Ronald Lance JUSTIN, Charles ELDEN, Jared KARRO, Mark TUCKER
  • Publication number: 20160116893
    Abstract: A system for autonomous enforcement of rules may comprise a protected system operative in response to input signals and an autonomous control system. The autonomous control system may include a monitor circuit which is coupled to the input signals to monitor the input signals for violations of the rules and an action circuit coupled to the protected system which prevents the violating input signals from affecting the protected system.
    Type: Application
    Filed: October 24, 2014
    Publication date: April 28, 2016
    Inventors: Ronald Lance Justin, Charles Elden, Jared Karro, Mark Tucker
  • Publication number: 20160078247
    Abstract: A system may be broken down into one or more components. Each of the components may be evaluated to ascribe a security score to each of the components. A composite security score may be generated for the system based on the security scores and a rate of decay measure characterizing a probabilistic security degradation of the system. The rate of decay measure may be applied to the composite security score to obtain a current composite security score. The composite security score may be used to control access to a document, either alone or in addition to other criteria.
    Type: Application
    Filed: September 15, 2015
    Publication date: March 17, 2016
    Inventors: Mark TUCKER, Charles ELDEN, Jared KARRO, Ronald Lance Justin
  • Publication number: 20150262074
    Abstract: A constraint problem may be represented as a digital circuit comprising at least one gate and at least one constrained input or at least one constrained output, or a combination of at least one constrained input and at least one constrained output. A matrix may be generated for each of the at least one gates. A constraint matrix may be generated for the at least one constrained input, the at least one constrained output, or the combination of at least one constrained input and at least one constrained output. A final matrix comprising a combination of each matrix for each of the at least one gates and the constraint matrix may be generated. The final matrix may be translated into an energy representation useable by a quantum computer. The energy of the energy representation may be minimized to generate a q-bit output, and a result of the constraint problem may be determined based on the q-bit output.
    Type: Application
    Filed: March 12, 2015
    Publication date: September 17, 2015
    Inventors: Jeremy BRUESTLE, Mark TUCKER
  • Publication number: 20150249677
    Abstract: A system may be broken down into one or more components. Each of the components may be evaluated to ascribe a security score to each of the components. A composite security score may be generated for the system based on the security scores and a rate of decay measure characterizing a probabilistic security degradation of the system. The rate of decay measure may be applied to the composite security score to obtain a current composite security score.
    Type: Application
    Filed: February 27, 2015
    Publication date: September 3, 2015
    Inventors: Mark TUCKER, Charles ELDEN, Jared KARRO
  • Publication number: 20130238564
    Abstract: First and second local file systems remote one from another and having a hierarchical storage structure wherein files are stored within folders within the first local file system. A first file within the first local file system with an embedded link to a second file on the local system is mirrored with a third file within the second local file system. The second file is then mirrored to the second local file system and the third file comprises an embedded link to the mirrored second file on the second file system.
    Type: Application
    Filed: March 1, 2013
    Publication date: September 12, 2013
    Applicant: FILETREK INC.
    Inventors: William Mark TUCKER, Benjamin Freeman PIERCEY
  • Publication number: 20130232121
    Abstract: First and second local file systems remote one from another and having a hierarchical storage structure wherein files are stored within folders within the first local file system and the second local file system. A first file in the first local file system is mirrored to a second file in the second file system. When the first file is modified the second file is updated with the modifications to the first file. When the second file is modified the first file is updated with the modifications to the second file.
    Type: Application
    Filed: March 1, 2013
    Publication date: September 5, 2013
    Applicant: FILETREK INC.
    Inventors: William Mark TUCKER, Benjamin Freeman PIERCEY
  • Patent number: 8206543
    Abstract: The present invention is directed to a continuous process that may be utilized to create an intermediate web assembly that includes a plurality of individual prime label segments with each segment having printed portion that has an outline and a pattern coated adhesive disposed on a first web which has an outline such that when the printed portion is applied over the pattern of adhesive, the outlines of each are substantially in alignment with one another. The process is utilized to create intricately shaped prime label products.
    Type: Grant
    Filed: January 11, 2006
    Date of Patent: June 26, 2012
    Assignee: Ward Kraft
    Inventors: Jesse D. Crum, D. Mark Tucker
  • Patent number: 7918585
    Abstract: A foldable, rechargeable light emitting diode (LED) pocket light is disclosed. The light includes a first compartment, a second compartment and a hinge element. The first compartment has a housing, a plurality of LED lights, a rotatable hinge, and a hook for hanging the light. The second compartment includes a housing, a member for receiving the rotatable hinge and a power source. The light also includes an activating member and circuitry for activating the LED lights.
    Type: Grant
    Filed: March 31, 2010
    Date of Patent: April 5, 2011
    Assignee: Walter R. Tucker Enterprises, Ltd.
    Inventor: Mark Tucker
  • Publication number: 20100195320
    Abstract: A foldable, rechargeable light emitting diode (LED) pocket light is disclosed. The light includes a first compartment, a second compartment and a hinge element. The first compartment has a housing, a plurality of LED lights, a rotatable hinge, and a hook for hanging the light. The second compartment includes a housing, a member for receiving the rotatable hinge and a power source. The light also includes an activating member and circuitry for activating the LED lights.
    Type: Application
    Filed: March 31, 2010
    Publication date: August 5, 2010
    Applicant: E-Z Red Company
    Inventor: Mark Tucker
  • Patent number: 7770096
    Abstract: A method of operating a matrix checksum includes the steps of determining a column checksum for the data bytes in an information packet. A row checksum for the data bytes in an information packet is determined. The information packet including the column checksum and the row checksum is transmitted.
    Type: Grant
    Filed: February 7, 2006
    Date of Patent: August 3, 2010
    Assignee: Cypress Semiconductor Corporation
    Inventors: Paul Frank Beard, Robert William Eugene Mack, Mark Tucker Gerrior
  • Patent number: 7717586
    Abstract: A foldable, rechargeable light emitting diode (LED) pocket light is disclosed. The light includes a first compartment, a second compartment and a hinge element. The first compartment has a housing, a plurality of LED lights, a rotatable hinge, and a hook for hanging the light. The second compartment includes a housing, a member for receiving the rotatable hinge and a power source. The light also includes an activating member and circuitry for activating the LED lights.
    Type: Grant
    Filed: January 11, 2008
    Date of Patent: May 18, 2010
    Assignee: E-Z Red Company
    Inventor: Mark Tucker
  • Publication number: 20080174991
    Abstract: A foldable, rechargeable light emitting diode (LED) pocket light is disclosed. The light includes a first compartment, a second compartment and a hinge element. The first compartment has a housing, a plurality of LED lights, a rotatable hinge, and a hook for hanging the light. The second compartment includes a housing, a member for receiving the rotatable hinge and a power source. The light also includes an activating member and circuitry for activating the LED lights.
    Type: Application
    Filed: January 11, 2008
    Publication date: July 24, 2008
    Applicant: E-Z Red Company
    Inventor: Mark Tucker
  • Publication number: 20080017270
    Abstract: The present invention provides thickened fabrics and reinforcements for use as a spacer or reinforcement for a matrix system. The fabric includes in a first embodiment a woven fabric comprising weft and warp yarns containing glass fibers. A portion of the weft yarns are undulated, resulting in an increased thickness for the fabric. The fabric is coated with a polymeric resin or bonding agent, for substantially binding the weft yarns in the undulated condition. This invention also includes methods for making such fabric by increasing the thickness of a woven or non-woven material by such methods as applying tension during weaving operations, or using unbalanced yarns.
    Type: Application
    Filed: July 26, 2007
    Publication date: January 24, 2008
    Inventors: Mark Newton, Mark Tucker
  • Publication number: 20070249509
    Abstract: A decontamination formulation and method of making that neutralizes the adverse health effects of both chemical and biological compounds, especially chemical warfare (CW) and biological warfare (BW) agents, and toxic industrial chemicals. The formulation provides solubilizing compounds that serve to effectively render the chemical and biological compounds, particularly CW and BW compounds, susceptible to attack, and at least one reactive compound that serves to attack (and detoxify or kill) the compound. The formulation includes at least one solubilizing agent, a reactive compound, a sorbent additive, and water. A highly adsorbent sorbent additive (e.g., amorphous silica, sorbitol, mannitol, etc.) is used to “dry out” one or more liquid ingredients into a dry, free-flowing powder that has an extended shelf life, and is more convenient to handle and mix in the field.
    Type: Application
    Filed: December 18, 2003
    Publication date: October 25, 2007
    Inventor: Mark Tucker