Patents by Inventor Martin Dawson

Martin Dawson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11914193
    Abstract: An optical assembly includes stacked planar lightwave circuit (PLC) members each having a plurality of waveguides in a respective plane, to provide optical connections to two-dimensional arrays of external optical waveguides (e.g., optical fiber cores), with one array including non-coplanar groups of waveguides having group members that are alternately arranged in a lateral direction. An optical assembly may provide optical connections between array of cores having a different pitch and/or orientation to serve as a fanout interface. Methods for fabricating an optical assembly are further provided.
    Type: Grant
    Filed: June 7, 2022
    Date of Patent: February 27, 2024
    Assignee: Corning Research & Development Corporation
    Inventors: Lars Martin Otfried Brusberg, Douglas Llewellyn Butler, David Francis Dawson-Elli, James Scott Sutherland
  • Patent number: 11645396
    Abstract: A method and system are provided for managing cybersecurity vulnerabilities of resources within at least one network. The method includes collecting data including application risk rank and network location. The method further includes determining a vulnerability score for vulnerabilities of the resources and determining severity score based on the application risk rank and network location. The method additionally includes integrating the vulnerability score and the severity score to create a two-dimensional risk ranking.
    Type: Grant
    Filed: August 6, 2021
    Date of Patent: May 9, 2023
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Bryan S. Inagaki, Martin Dawson, Andrew Graham, Ramiro Rodney Murgueytio, David J. Robinson, Ajay D. Vachhani, Travis Washburn
  • Publication number: 20220387001
    Abstract: A urine collection device is provided. The urine collection device includes a basin configured to fit a perineal region of a female human subject and to receive urine; a lip attached to the basin and having a contact surface for attachment to the perineal region; a ridge extending into the basin and disposed along an inferior portion of the lip to prevent leakage of urine from the basin; and a drain opening in the basin for draining the urine. The urine collection device advantageously prevents leakage and allows for easy access for urine analysis and measurement of urine output. Methods and systems for collecting and quantifying urine are also provided.
    Type: Application
    Filed: November 13, 2020
    Publication date: December 8, 2022
    Inventors: David ASKENAZI, Lynn DILL, Martin Dawson HOLLAND, Shelby LEVERETT, Elizabeth DECHANT
  • Publication number: 20210374250
    Abstract: A method and system are provided for managing cybersecurity vulnerabilities of resources within at least one network. The method includes collecting data including application risk rank and network location. The method further includes determining a vulnerability score for vulnerabilities of the resources and determining severity score based on the application risk rank and network location. The method additionally includes integrating the vulnerability score and the severity score to create a two-dimensional risk ranking.
    Type: Application
    Filed: August 6, 2021
    Publication date: December 2, 2021
    Applicant: JPMorgan Chase Bank, N.A.
    Inventors: Bryan S. INAGAKI, Martin DAWSON, Andrew GRAHAM, Ramiro Rodney MURGUEYTIO, David J. ROBINSON, Ajay D. VACHHANI, Travis WASHBURN
  • Patent number: 11120139
    Abstract: A method and system are provided for managing cybersecurity vulnerabilities of resources within at least one network. The method includes collecting data including application risk rank and network location. The method further includes determining a vulnerability score for vulnerabilities of the resources and determining severity score based on the application risk rank and network location. The method additionally includes integrating the vulnerability score and the severity score to create a two-dimensional risk ranking.
    Type: Grant
    Filed: June 19, 2019
    Date of Patent: September 14, 2021
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Bryan S. Inagaki, Martin Dawson, Andrew Graham, Ramiro Rodney Murgueytio, David J. Robinson, Ajay D. Vachhani, Travis Washburn
  • Patent number: 10922292
    Abstract: Systems and methods for securing sensitive data are presented. The system includes a database that stores multiple data storage schemes, each of which denotes at least one location for storing at least a portion of the sensitive data within a data block object. The system further includes a security controller module comprising a processor and software instructions. When executed by the processor, the processor (a) instantiates a data block object for storing the sensitive data and (b) selects a data storage scheme. Then the processor stores the sensitive data within the data block object according to the data storage scheme. The processor also can provide access to the data block object. After allowing an access, the processor automatically selects another data storage scheme, and morphs the data block object by storing the sensitive data within the data block object according to the newly selected data storage scheme.
    Type: Grant
    Filed: March 15, 2016
    Date of Patent: February 16, 2021
    Assignee: Webcloak, LLC
    Inventor: Martin Dawson
  • Publication number: 20190362078
    Abstract: A method and system are provided for managing cybersecurity vulnerabilities of resources within at least one network. The method includes collecting data including application risk rank and network location. The method further includes determining a vulnerability score for vulnerabilities of the resources and determining severity score based on the application risk rank and network location. The method additionally includes integrating the vulnerability score and the severity score to create a two-dimensional risk ranking.
    Type: Application
    Filed: June 19, 2019
    Publication date: November 28, 2019
    Applicant: JPMorgan Chase Bank, N.A.
    Inventors: Bryan S. INAGAKI, Martin DAWSON, Andrew GRAHAM, Ramiro Rodney MURGUEYTIO, David J. ROBINSON, Ajay D. VACHHANI, Travis WASHBURN
  • Patent number: 10372915
    Abstract: A method and system are provided for managing cybersecurity vulnerabilities of resources within at least one network. The method includes collecting data including application risk rank and network location. The method further includes determining a vulnerability score for vulnerabilities of the resources and determining a severity score based on the application risk rank and network location. The method additionally includes integrating the vulnerability score and the severity score to create a two-dimensional risk ranking and prioritizing remediation of the vulnerabilities based on the two-dimensional risk ranking.
    Type: Grant
    Filed: July 26, 2017
    Date of Patent: August 6, 2019
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Bryan S. Inagaki, Martin Dawson, Andrew Graham, Ramiro R. Murgueytio, David J. Robinson, Ajay D. Vachhani, Travis Washburn
  • Patent number: 10230693
    Abstract: Portable, hand-held electronic devices for and methods to enabling a user to interact with a native operating system (OS) running on a host device and a virtual machine running on top of the native OS are presented. The host device includes a processor to communicate with an application having a target network address. The devices includes an onboard database that stores user credential information and a portable encryption and authentication service module (PPEASM) that allows to make a secure communication channel with the host device. The PPEASM configures the processor to negotiate authentication of the user with an application running on top of the native OS utilizing the user credential information, render an application running on top of the virtual machine, and pass data between the application running on top of the virtual machine and a second application running on top of the native OS.
    Type: Grant
    Filed: January 29, 2016
    Date of Patent: March 12, 2019
    Assignee: WEBCLOAK, LLC
    Inventor: Martin Dawson
  • Patent number: 10171427
    Abstract: Portable, hand-held electronic devices and methods to allow a user to anonymously utilize a host device are presented. The host device includes a processor to communicate with an application having a target network address. The portable, hand-held electronic devices includes an onboard database that stores user credential information and a portable encryption and authentication service module (PPEASM) that allows to make a secure communication channel with the host device. The PPEASM configures the processor of the host device to instantiate a virtual machine and render an encrypted messaging interface for communicating between the virtual machine and the application in the host device. Then, PPEASM can also configure the processor to negotiate authentication of the user with the application by utilizing the user credential information and information received through the encrypted messaging interface.
    Type: Grant
    Filed: January 29, 2016
    Date of Patent: January 1, 2019
    Assignee: WEBCLOAK, LLC
    Inventor: Martin Dawson
  • Publication number: 20180032736
    Abstract: A method and system are provided for managing cybersecurity vulnerabilities of resources within at least one network. The method includes collecting data including application risk rank and network location. The method further includes determining a vulnerability score for vulnerabilities of the resources and determining a severity score based on the application risk rank and network location. The method additionally includes integrating the vulnerability score and the severity score to create a two-dimensional risk ranking and prioritizing remediation of the vulnerabilities based on the two-dimensional risk ranking.
    Type: Application
    Filed: July 26, 2017
    Publication date: February 1, 2018
    Inventors: Brian S. Inagaki, Martin Dawson, Andrew Graham, Ramiro R. Murgueytio, David J. Robinson, Ajay D. Vachhani, Travis Washburn
  • Publication number: 20160282475
    Abstract: A method for a mobile location center (MLC) to determine a location of a mobile device in a wireless communication network includes receiving a request to determine the location of the mobile device; concurrently requesting global navigation satellite system (GNSS) measurements from the mobile device and terrestrial measurements from transceivers in the wireless communication network, and receiving the GNSS measurements and at least one of the terrestrial measurements. A GNSS location of the mobile device is calculated as a function of the GNSS measurements, and the calculated GNSS location is determined to be the location of the mobile device when the calculated GNSS location meets a predetermined accuracy threshold. A terrestrial location of the mobile device is calculated as a function of the terrestrial measurements, and the calculated terrestrial location is determined to be the location of the mobile device when the calculated terrestrial location meets the predetermined accuracy threshold.
    Type: Application
    Filed: June 8, 2016
    Publication date: September 29, 2016
    Inventors: Neil HARPER, Martin DAWSON
  • Publication number: 20160283744
    Abstract: Systems and methods for securing sensitive data are presented. The system includes a database that stores multiple data storage schemes, each of which denotes at least one location for storing at least a portion of the sensitive data within a data block object. The system further includes a security controller module comprising a processor and software instructions. When executed by the processor, the processor (a) instantiates a data block object for storing the sensitive data and (b) selects a data storage scheme. Then the processor stores the sensitive data within the data block object according to the data storage scheme. The processor also can provide access to the data block object. After allowing an access, the processor automatically selects another data storage scheme, and morphs the data block object by storing the sensitive data within the data block object according to the newly selected data storage scheme.
    Type: Application
    Filed: March 15, 2016
    Publication date: September 29, 2016
    Inventor: Martin Dawson
  • Publication number: 20160226833
    Abstract: Portable, hand-held electronic devices and methods to allow a user to anonymously utilize a host device are presented. The host device includes a processor to communicate with an application having a target network address. The portable, hand-held electronic devices includes an onboard database that stores user credential information and a portable encryption and authentication service module (PPEASM) that allows to make a secure communication channel with the host device. The PPEASM configures the processor of the host device to instantiate a virtual machine and render an encrypted messaging interface for communicating between the virtual machine and the application in the host device. Then, PPEASM can also configure the processor to negotiate authentication of the user with the application by utilizing the user credential information and information received through the encrypted messaging interface.
    Type: Application
    Filed: January 29, 2016
    Publication date: August 4, 2016
    Inventor: Martin Dawson
  • Publication number: 20160226834
    Abstract: Portable, hand-held electronic devices for and methods to enabling a user to interact with a native operating system (OS) running on a host device and a virtual machine running on top of the native OS are presented. The host device includes a processor to communicate with an application having a target network address. The devices includes an onboard database that stores user credential information and a portable encryption and authentication service module (PPEASM) that allows to make a secure communication channel with the host device. The PPEASM configures the processor to negotiate authentication of the user with an application running on top of the native OS utilizing the user credential information, render an application running on top of the virtual machine, and pass data between the application running on top of the virtual machine and a second application running on top of the native OS.
    Type: Application
    Filed: January 29, 2016
    Publication date: August 4, 2016
    Inventor: Martin Dawson
  • Patent number: 9392521
    Abstract: A method for a mobile location center (MLC) to determine a location of a mobile device in a wireless communication network includes receiving a request to determine the location of the mobile device; concurrently requesting global navigation satellite system (GNSS) measurements from the mobile device and terrestrial measurements from transceivers in the wireless communication network, and receiving the GNSS measurements and at least one of the terrestrial measurements. A GNSS location of the mobile device is calculated as a function of the GNSS measurements, and the calculated GNSS location is determined to be the location of the mobile device when the calculated GNSS location meets a predetermined accuracy threshold. A terrestrial location of the mobile device is calculated as a function of the terrestrial measurements, and the calculated terrestrial location is determined to be the location of the mobile device when the calculated terrestrial location meets the predetermined accuracy threshold.
    Type: Grant
    Filed: March 18, 2009
    Date of Patent: July 12, 2016
    Assignee: Telecommunication Systems, Inc.
    Inventors: Neil Harper, Martin Dawson
  • Patent number: 8638259
    Abstract: A system and method for determining the location of a wireless device. A boundary for an approximate area in which the wireless device is located is determined and a plurality of satellites may be determined as a function of the boundary. Assistance data is transmitted to the device which includes information from the plurality of satellites, and the location of the wireless device may be determined from the information. In one embodiment, if the number of the plurality of satellites is greater than a predetermined threshold then the number of satellites may be reduced as a function of one or more of the elevation of each satellite above the horizon, a distance between each satellite to one or more other satellites, and an altitude of each satellite.
    Type: Grant
    Filed: September 1, 2010
    Date of Patent: January 28, 2014
    Assignee: Maple Acquisition LLC
    Inventors: Neil Harper, Martin Dawson, Martin Thomson
  • Patent number: 8378888
    Abstract: A system and method for determining the location of a mobile device. A first set of signals from a plurality of radio frequency (“RF”) sources may be received at a mobile device and then downconverted into a second set of signals. The mobile device may then time stamp the second set of signals and transmit the time stamped signals to a location determining system. The location of the mobile device may be determined at the location determining system as a function of the time stamped signals.
    Type: Grant
    Filed: February 28, 2012
    Date of Patent: February 19, 2013
    Assignee: Andrew LLC
    Inventors: Neil Harper, Martin Dawson
  • Patent number: 8213955
    Abstract: A system and method for determining an approximate location of a mobile device. The occurrence of a predetermined event may be determined at a first node of a network. Measurement data associated with the mobile device may be stored at a second node of the network. An attempt may be made to determine a location of the mobile device using a first location methodology. Upon failure of the location attempt, the mobile device data may be received at a third node of the network from the second node. At the third node an approximate location of the mobile device may be determined using the mobile device data.
    Type: Grant
    Filed: May 1, 2008
    Date of Patent: July 3, 2012
    Assignee: Andrew, LLC
    Inventors: John P. Carlson, Martin Dawson
  • Publication number: 20120154220
    Abstract: A system and method for determining the location of a mobile device. A first set of signals from a plurality of radio frequency (“RF”) sources may be received at a mobile device and then downconverted into a second set of signals. The mobile device may then time stamp the second set of signals and transmit the time stamped signals to a location determining system. The location of the mobile device may be determined at the location determining system as a function of the time stamped signals.
    Type: Application
    Filed: February 28, 2012
    Publication date: June 21, 2012
    Applicant: Andrew, LLC
    Inventors: Neil Harper, Martin Dawson