Patents by Inventor Martin Dawson
Martin Dawson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11645396Abstract: A method and system are provided for managing cybersecurity vulnerabilities of resources within at least one network. The method includes collecting data including application risk rank and network location. The method further includes determining a vulnerability score for vulnerabilities of the resources and determining severity score based on the application risk rank and network location. The method additionally includes integrating the vulnerability score and the severity score to create a two-dimensional risk ranking.Type: GrantFiled: August 6, 2021Date of Patent: May 9, 2023Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Bryan S. Inagaki, Martin Dawson, Andrew Graham, Ramiro Rodney Murgueytio, David J. Robinson, Ajay D. Vachhani, Travis Washburn
-
Publication number: 20220387001Abstract: A urine collection device is provided. The urine collection device includes a basin configured to fit a perineal region of a female human subject and to receive urine; a lip attached to the basin and having a contact surface for attachment to the perineal region; a ridge extending into the basin and disposed along an inferior portion of the lip to prevent leakage of urine from the basin; and a drain opening in the basin for draining the urine. The urine collection device advantageously prevents leakage and allows for easy access for urine analysis and measurement of urine output. Methods and systems for collecting and quantifying urine are also provided.Type: ApplicationFiled: November 13, 2020Publication date: December 8, 2022Inventors: David ASKENAZI, Lynn DILL, Martin Dawson HOLLAND, Shelby LEVERETT, Elizabeth DECHANT
-
Publication number: 20210374250Abstract: A method and system are provided for managing cybersecurity vulnerabilities of resources within at least one network. The method includes collecting data including application risk rank and network location. The method further includes determining a vulnerability score for vulnerabilities of the resources and determining severity score based on the application risk rank and network location. The method additionally includes integrating the vulnerability score and the severity score to create a two-dimensional risk ranking.Type: ApplicationFiled: August 6, 2021Publication date: December 2, 2021Applicant: JPMorgan Chase Bank, N.A.Inventors: Bryan S. INAGAKI, Martin DAWSON, Andrew GRAHAM, Ramiro Rodney MURGUEYTIO, David J. ROBINSON, Ajay D. VACHHANI, Travis WASHBURN
-
Patent number: 11120139Abstract: A method and system are provided for managing cybersecurity vulnerabilities of resources within at least one network. The method includes collecting data including application risk rank and network location. The method further includes determining a vulnerability score for vulnerabilities of the resources and determining severity score based on the application risk rank and network location. The method additionally includes integrating the vulnerability score and the severity score to create a two-dimensional risk ranking.Type: GrantFiled: June 19, 2019Date of Patent: September 14, 2021Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Bryan S. Inagaki, Martin Dawson, Andrew Graham, Ramiro Rodney Murgueytio, David J. Robinson, Ajay D. Vachhani, Travis Washburn
-
Patent number: 10922292Abstract: Systems and methods for securing sensitive data are presented. The system includes a database that stores multiple data storage schemes, each of which denotes at least one location for storing at least a portion of the sensitive data within a data block object. The system further includes a security controller module comprising a processor and software instructions. When executed by the processor, the processor (a) instantiates a data block object for storing the sensitive data and (b) selects a data storage scheme. Then the processor stores the sensitive data within the data block object according to the data storage scheme. The processor also can provide access to the data block object. After allowing an access, the processor automatically selects another data storage scheme, and morphs the data block object by storing the sensitive data within the data block object according to the newly selected data storage scheme.Type: GrantFiled: March 15, 2016Date of Patent: February 16, 2021Assignee: Webcloak, LLCInventor: Martin Dawson
-
Publication number: 20190362078Abstract: A method and system are provided for managing cybersecurity vulnerabilities of resources within at least one network. The method includes collecting data including application risk rank and network location. The method further includes determining a vulnerability score for vulnerabilities of the resources and determining severity score based on the application risk rank and network location. The method additionally includes integrating the vulnerability score and the severity score to create a two-dimensional risk ranking.Type: ApplicationFiled: June 19, 2019Publication date: November 28, 2019Applicant: JPMorgan Chase Bank, N.A.Inventors: Bryan S. INAGAKI, Martin DAWSON, Andrew GRAHAM, Ramiro Rodney MURGUEYTIO, David J. ROBINSON, Ajay D. VACHHANI, Travis WASHBURN
-
Patent number: 10372915Abstract: A method and system are provided for managing cybersecurity vulnerabilities of resources within at least one network. The method includes collecting data including application risk rank and network location. The method further includes determining a vulnerability score for vulnerabilities of the resources and determining a severity score based on the application risk rank and network location. The method additionally includes integrating the vulnerability score and the severity score to create a two-dimensional risk ranking and prioritizing remediation of the vulnerabilities based on the two-dimensional risk ranking.Type: GrantFiled: July 26, 2017Date of Patent: August 6, 2019Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Bryan S. Inagaki, Martin Dawson, Andrew Graham, Ramiro R. Murgueytio, David J. Robinson, Ajay D. Vachhani, Travis Washburn
-
Patent number: 10230693Abstract: Portable, hand-held electronic devices for and methods to enabling a user to interact with a native operating system (OS) running on a host device and a virtual machine running on top of the native OS are presented. The host device includes a processor to communicate with an application having a target network address. The devices includes an onboard database that stores user credential information and a portable encryption and authentication service module (PPEASM) that allows to make a secure communication channel with the host device. The PPEASM configures the processor to negotiate authentication of the user with an application running on top of the native OS utilizing the user credential information, render an application running on top of the virtual machine, and pass data between the application running on top of the virtual machine and a second application running on top of the native OS.Type: GrantFiled: January 29, 2016Date of Patent: March 12, 2019Assignee: WEBCLOAK, LLCInventor: Martin Dawson
-
Patent number: 10171427Abstract: Portable, hand-held electronic devices and methods to allow a user to anonymously utilize a host device are presented. The host device includes a processor to communicate with an application having a target network address. The portable, hand-held electronic devices includes an onboard database that stores user credential information and a portable encryption and authentication service module (PPEASM) that allows to make a secure communication channel with the host device. The PPEASM configures the processor of the host device to instantiate a virtual machine and render an encrypted messaging interface for communicating between the virtual machine and the application in the host device. Then, PPEASM can also configure the processor to negotiate authentication of the user with the application by utilizing the user credential information and information received through the encrypted messaging interface.Type: GrantFiled: January 29, 2016Date of Patent: January 1, 2019Assignee: WEBCLOAK, LLCInventor: Martin Dawson
-
Publication number: 20180032736Abstract: A method and system are provided for managing cybersecurity vulnerabilities of resources within at least one network. The method includes collecting data including application risk rank and network location. The method further includes determining a vulnerability score for vulnerabilities of the resources and determining a severity score based on the application risk rank and network location. The method additionally includes integrating the vulnerability score and the severity score to create a two-dimensional risk ranking and prioritizing remediation of the vulnerabilities based on the two-dimensional risk ranking.Type: ApplicationFiled: July 26, 2017Publication date: February 1, 2018Inventors: Brian S. Inagaki, Martin Dawson, Andrew Graham, Ramiro R. Murgueytio, David J. Robinson, Ajay D. Vachhani, Travis Washburn
-
Publication number: 20160282475Abstract: A method for a mobile location center (MLC) to determine a location of a mobile device in a wireless communication network includes receiving a request to determine the location of the mobile device; concurrently requesting global navigation satellite system (GNSS) measurements from the mobile device and terrestrial measurements from transceivers in the wireless communication network, and receiving the GNSS measurements and at least one of the terrestrial measurements. A GNSS location of the mobile device is calculated as a function of the GNSS measurements, and the calculated GNSS location is determined to be the location of the mobile device when the calculated GNSS location meets a predetermined accuracy threshold. A terrestrial location of the mobile device is calculated as a function of the terrestrial measurements, and the calculated terrestrial location is determined to be the location of the mobile device when the calculated terrestrial location meets the predetermined accuracy threshold.Type: ApplicationFiled: June 8, 2016Publication date: September 29, 2016Inventors: Neil HARPER, Martin DAWSON
-
Publication number: 20160283744Abstract: Systems and methods for securing sensitive data are presented. The system includes a database that stores multiple data storage schemes, each of which denotes at least one location for storing at least a portion of the sensitive data within a data block object. The system further includes a security controller module comprising a processor and software instructions. When executed by the processor, the processor (a) instantiates a data block object for storing the sensitive data and (b) selects a data storage scheme. Then the processor stores the sensitive data within the data block object according to the data storage scheme. The processor also can provide access to the data block object. After allowing an access, the processor automatically selects another data storage scheme, and morphs the data block object by storing the sensitive data within the data block object according to the newly selected data storage scheme.Type: ApplicationFiled: March 15, 2016Publication date: September 29, 2016Inventor: Martin Dawson
-
Publication number: 20160226834Abstract: Portable, hand-held electronic devices for and methods to enabling a user to interact with a native operating system (OS) running on a host device and a virtual machine running on top of the native OS are presented. The host device includes a processor to communicate with an application having a target network address. The devices includes an onboard database that stores user credential information and a portable encryption and authentication service module (PPEASM) that allows to make a secure communication channel with the host device. The PPEASM configures the processor to negotiate authentication of the user with an application running on top of the native OS utilizing the user credential information, render an application running on top of the virtual machine, and pass data between the application running on top of the virtual machine and a second application running on top of the native OS.Type: ApplicationFiled: January 29, 2016Publication date: August 4, 2016Inventor: Martin Dawson
-
Publication number: 20160226833Abstract: Portable, hand-held electronic devices and methods to allow a user to anonymously utilize a host device are presented. The host device includes a processor to communicate with an application having a target network address. The portable, hand-held electronic devices includes an onboard database that stores user credential information and a portable encryption and authentication service module (PPEASM) that allows to make a secure communication channel with the host device. The PPEASM configures the processor of the host device to instantiate a virtual machine and render an encrypted messaging interface for communicating between the virtual machine and the application in the host device. Then, PPEASM can also configure the processor to negotiate authentication of the user with the application by utilizing the user credential information and information received through the encrypted messaging interface.Type: ApplicationFiled: January 29, 2016Publication date: August 4, 2016Inventor: Martin Dawson
-
Patent number: 9392521Abstract: A method for a mobile location center (MLC) to determine a location of a mobile device in a wireless communication network includes receiving a request to determine the location of the mobile device; concurrently requesting global navigation satellite system (GNSS) measurements from the mobile device and terrestrial measurements from transceivers in the wireless communication network, and receiving the GNSS measurements and at least one of the terrestrial measurements. A GNSS location of the mobile device is calculated as a function of the GNSS measurements, and the calculated GNSS location is determined to be the location of the mobile device when the calculated GNSS location meets a predetermined accuracy threshold. A terrestrial location of the mobile device is calculated as a function of the terrestrial measurements, and the calculated terrestrial location is determined to be the location of the mobile device when the calculated terrestrial location meets the predetermined accuracy threshold.Type: GrantFiled: March 18, 2009Date of Patent: July 12, 2016Assignee: Telecommunication Systems, Inc.Inventors: Neil Harper, Martin Dawson
-
Patent number: 8638259Abstract: A system and method for determining the location of a wireless device. A boundary for an approximate area in which the wireless device is located is determined and a plurality of satellites may be determined as a function of the boundary. Assistance data is transmitted to the device which includes information from the plurality of satellites, and the location of the wireless device may be determined from the information. In one embodiment, if the number of the plurality of satellites is greater than a predetermined threshold then the number of satellites may be reduced as a function of one or more of the elevation of each satellite above the horizon, a distance between each satellite to one or more other satellites, and an altitude of each satellite.Type: GrantFiled: September 1, 2010Date of Patent: January 28, 2014Assignee: Maple Acquisition LLCInventors: Neil Harper, Martin Dawson, Martin Thomson
-
Patent number: 8378888Abstract: A system and method for determining the location of a mobile device. A first set of signals from a plurality of radio frequency (“RF”) sources may be received at a mobile device and then downconverted into a second set of signals. The mobile device may then time stamp the second set of signals and transmit the time stamped signals to a location determining system. The location of the mobile device may be determined at the location determining system as a function of the time stamped signals.Type: GrantFiled: February 28, 2012Date of Patent: February 19, 2013Assignee: Andrew LLCInventors: Neil Harper, Martin Dawson
-
Patent number: 8213955Abstract: A system and method for determining an approximate location of a mobile device. The occurrence of a predetermined event may be determined at a first node of a network. Measurement data associated with the mobile device may be stored at a second node of the network. An attempt may be made to determine a location of the mobile device using a first location methodology. Upon failure of the location attempt, the mobile device data may be received at a third node of the network from the second node. At the third node an approximate location of the mobile device may be determined using the mobile device data.Type: GrantFiled: May 1, 2008Date of Patent: July 3, 2012Assignee: Andrew, LLCInventors: John P. Carlson, Martin Dawson
-
Publication number: 20120154220Abstract: A system and method for determining the location of a mobile device. A first set of signals from a plurality of radio frequency (“RF”) sources may be received at a mobile device and then downconverted into a second set of signals. The mobile device may then time stamp the second set of signals and transmit the time stamped signals to a location determining system. The location of the mobile device may be determined at the location determining system as a function of the time stamped signals.Type: ApplicationFiled: February 28, 2012Publication date: June 21, 2012Applicant: Andrew, LLCInventors: Neil Harper, Martin Dawson
-
Patent number: 8125377Abstract: A system and method for determining the location of a mobile device. A first set of signals from a plurality of radio frequency (“RF”) sources may be received at a mobile device and then downconverted into a second set of signals. The mobile device may then time stamp the second set of signals and transmit the time stamped signals to a location determining system. The location of the mobile device may be determined at the location determining system as a function of the time stamped signals.Type: GrantFiled: November 17, 2008Date of Patent: February 28, 2012Assignee: Andrew LLCInventors: Neil Harper, Martin Dawson