Patents by Inventor Matthew Dunn

Matthew Dunn has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240125196
    Abstract: A wellhead assembly includes a containment system having a mechanical barrier, a tertiary wiper, and a fluid jet assembly. A mechanical barrier includes a body disposed in a housing, the body having an opening extending through an axial thickness of the body. A tertiary wiper has an elastomeric body with a hole extending centrally therethrough. A fluid jet assembly includes a jet assembly body having a wall defining a cavity extending axially through the jet assembly body and an array of nozzles positioned circumferentially around the wall, wherein each nozzle has an outlet directed in a radially inward direction from the wall toward a central region in the cavity. The components of the containment system are arranged an axially stacked arrangement relative to each other.
    Type: Application
    Filed: October 17, 2023
    Publication date: April 18, 2024
    Applicant: Hydril USA Distribution LLC
    Inventors: Kevin M. Sweeney, Greg Matthew Dunn, Hunter Scott Haeberle, Robert Andrew Peralez
  • Patent number: 11962552
    Abstract: An endpoint agent extension of a cyber defense system for email that includes modules and machine learning models. An integration module integrates with an email client application to detect email cyber threats in emails in the email client application as well as regulate emails. An action module interfaces with the email client application to direct autonomous actions against an outbound email and/or its files when a cyber threat module determines the email and/or its files (a) to be a data exfiltration threat, (b) to be both malicious and anomalous behavior as compared to a user's modeled email behavior, and (c) any combination of these. The autonomous actions can include actions of logging a user off the email client application, preventing the sending of the email, stripping the attached files and/or disabling the link to the files from the email, and sending a notification to cyber security personnel regarding the email.
    Type: Grant
    Filed: August 27, 2020
    Date of Patent: April 16, 2024
    Assignee: Darktrace Holdings Limited
    Inventors: Stephen Pickman, Matthew Dunn
  • Patent number: 11962608
    Abstract: A cyber-threat defense system for a network including its email domain protects this network from cyber threats. Modules utilize machine learning models as well communicate with a cyber threat module. Modules analyze the wide range of metadata from the observed email communications. The cyber threat module analyzes with the machine learning models trained on a normal behavior of email activity and user activity associated with the network and in its email domain in order to determine when a deviation from the normal behavior of email activity and user activity is occurring. A mass email association detector determines a similarity between highly similar emails being i) sent from or ii) received by a collection of two or more individual users in the email domain in a substantially simultaneous time frame. Mathematical models can be used to determine similarity weighing in order to derive a similarity score between compared emails.
    Type: Grant
    Filed: October 14, 2022
    Date of Patent: April 16, 2024
    Assignee: Darktrace Holdings Limited
    Inventors: Matthew Dunn, Matthew Ferguson, Stephen Pickman
  • Patent number: 11956362
    Abstract: The subject disclosure relates to systems, devices, and methods for executing operations related to procurement of individualized medicine therapies. Also disclosed are embodiments systems, methods, and devices for accessing a wide range of individualized medicine platform modules. Furthermore, disclosed herein are individualized medicine platform systems, methods and devices communicatively coupled to blockchain computing systems comprising several nodes. The disclosed systems, methods, and devices also generate chain of custody and chain of identity event data.
    Type: Grant
    Filed: January 27, 2022
    Date of Patent: April 9, 2024
    Assignee: Janssen Biotech, Inc.
    Inventors: Khurram Mahmood, Eric Matthew Bell, Stuart Maxwell Altman, Jeremy Alan Dunn, Sambasiva R. Pedapalli, Christopher Prado Dunn, Nerses Ohanyan, Anand Kothari, Ryan Jeffrey Southwick, Richard Brewster Wickersham, III
  • Patent number: 11922118
    Abstract: The present disclosure relates generally to systems and methods for analyzing intent. Intents may be analyzed to determine to which device or agent to route a communication. The analyzed intent information can also be used to formulate reports and analyze the accuracy of the identified intents with respect to the received communication.
    Type: Grant
    Filed: September 7, 2022
    Date of Patent: March 5, 2024
    Assignee: LIVEPERSON, INC.
    Inventors: Matthew Dunn, Joe Bradley, Laura Onu
  • Publication number: 20240060959
    Abstract: A methane monitoring device including a harness component, the harness component configured to adjustably and releasably fix to a ruminant, a monitoring component releasably fixed to the harness component, the monitoring component disposed proximate the ruminant's nostrils and further including a nostril cover disposed proximate the ruminant's nostrils, at least one sensor configured to detect methane concentration in air, a data storage component in electrical communication with the sensor, the data storage component configured to store data.
    Type: Application
    Filed: August 18, 2023
    Publication date: February 22, 2024
    Inventors: Matthew Dunn, Colin South, Eric Beppler, Jaclyn Halula, Brian Merrill, Eric Layton, Tanner Leise
  • Patent number: 11876757
    Abstract: Disclosed embodiments provide a framework to assist bot managers and builders in identifying particular friction points between bots and customers to allow for real-time identification of bot conversation issues and to train bots to improve conversation flows. Conversation data is processed using machine learning models to detect bot states within conversations and calculate a Meaningful Automated Connection Score (MACS) for these conversations. The MACS for a conversation is provided to bot builders to allow the bot builders to identify friction points and update bots accordingly.
    Type: Grant
    Filed: October 5, 2022
    Date of Patent: January 16, 2024
    Assignee: LIVEPERSON, INC.
    Inventors: Michael Higgins, Akshay Hazare, Andrew Maurer, Matthew Dunn, George Bonev
  • Publication number: 20240009291
    Abstract: The present invention is related to compositions and methods that reduce methane production in ruminant populations.
    Type: Application
    Filed: July 11, 2023
    Publication date: January 11, 2024
    Inventors: Colin South, Matthew Dunn, Lauren Fitch, Joseph Koos, Laura Holland, Brigid Arciero, James Spoonamore, Caitlin Allen, Alexander Hsu, Sara Tabandeh, Frederick Richard Kearney
  • Publication number: 20240002726
    Abstract: The present disclosure provides compositions and methods for reducing emissions of deleterious atmospheric gases and/or precursors thereof from a flooded ecosystem comprising: one or more small molecules that reduce the production of one or more deleterious atmospheric gases and/or precursors thereof and one or more agriculturally suitable carriers.
    Type: Application
    Filed: June 30, 2023
    Publication date: January 4, 2024
    Inventors: Colin SOUTH, Matthew Dunn, Caitlin Allen, Alexander Hsu, Sara Tabandeh, Frederick Richard Kearney
  • Publication number: 20230421602
    Abstract: The cyber security appliance can have at least the following components. A phishing site detector that has a segmentation module to break up an image of a page of a site under analysis into multiple segments and then analyze each segment of the image to determine visually whether a key text-like feature exists in that segment. A signature creator creates a digital signature for each segment containing a particular key text-like feature. The digital signature for that segment is indicative of a visual appearance of the particular key text-like feature. Trained AI models compare digital signatures from a set of key text-like features detected in the image of that page under analysis to digital signatures of a set of key text-like features from known bad phishing sites in order to output a likelihood of maliciousness of the unknown site under analysis.
    Type: Application
    Filed: July 7, 2023
    Publication date: December 28, 2023
    Inventors: John Anthony Boyer, Matthew Dunn
  • Publication number: 20230410123
    Abstract: An intent confusion evaluation engine receives conversation data corresponding to conversations between customers and agents. The engine evaluates annotations in the conversation data corresponding to intents identified from messages exchanged between customers and agents to determine levels of confusion amongst different intents. Based on these levels of confusion, the engine creates a graphical representation that illustrates the various intents and the level of confusion between different pairings of intents for the set of conversations. If an update is provided to the annotations, the graphical representation is updated dynamically and in real-time to provide updated levels of confusion amongst the various intents in accordance with the update.
    Type: Application
    Filed: May 2, 2023
    Publication date: December 21, 2023
    Applicant: LIVEPERSON, INC.
    Inventors: Matthew Dunn, Michael Higgins
  • Patent number: 11809504
    Abstract: A tracking system passively tracks and records searches conducted by actual search engine users. The recorded data for each search event preferably includes the search query submitted, the search engine used, the search result item (e.g., web page) selected, the position (e.g., page number) of this item, and the user's IP address. The collected data is aggregated and analyzed to generate data regarding the search queries used to locate and access particular destinations (e.g., web pages and sites). This data may be used for various purposes, such as (1) to generate reports showing, e.g., how users reach a particular destination from different search engines and geographic locations, (2) to select content to display on a destination page, such that the content is relevant to search queries commonly used to locate that page, and (3) to update the database of one search engine to reflect searches conducted on other search engines.
    Type: Grant
    Filed: November 24, 2021
    Date of Patent: November 7, 2023
    Assignee: Gula Consulting Limited Liability Company
    Inventors: Richard Kazimierz Zwicky, Todd William Hooge, Matthew Dunn
  • Publication number: 20230336581
    Abstract: The node exposure score generator and the attack path modeling component are configured to cooperate to analyze the actual detected vulnerabilities that exist for that network node in the network, the importance of network nodes in the network compared to other network nodes in the network, and the key pathways within the network and the vulnerable network nodes in the network that a cyber-attack would use during the cyber-attack in order to provide an intelligent prioritization of remediation actions to remediate the actual detected vulnerabilities for each network node from the network protected by a cyber security appliance.
    Type: Application
    Filed: July 7, 2022
    Publication date: October 19, 2023
    Inventors: Matthew Dunn, Maximilian Florian Thomas Heinemeyer, Jake Lai, Carl Joseph Salji
  • Publication number: 20230308472
    Abstract: An autonomous email-report composer composes a type of report on cyber threats that is composed in a human-readable format with natural language prose, terminology, and level of detail on the cyber threats aimed at a target audience. The autonomous email-report composer cooperates with libraries with prewritten text templates with i) standard pre-written sentences written in the natural language prose and ii) prewritten text templates with fillable blanks that are populated with data for the cyber threats specific for a current report being composed, where a template for the type of report contains two or more sections in that template. Each section having different standard pre-written sentences written in the natural language prose.
    Type: Application
    Filed: July 29, 2020
    Publication date: September 28, 2023
    Inventors: John Anthony Boyer, Dickon Humphrey, Matthew Dunn
  • Patent number: 11716347
    Abstract: The cyber security appliance can have at least the following components. A phishing site detector that has a segmentation module to break up an image of a page of a site under analysis into multiple segments and then analyze each segment of the image to determine visually whether a key text-like feature exists in that segment. A signature creator creates a digital signature for each segment containing a particular key text-like feature. The digital signature for that segment is indicative of a visual appearance of the particular key text-like feature. Trained AI models compare digital signatures from a set of key text-like features detected in the image of that page under analysis to digital signatures of a set of key text-like features from known bad phishing sites in order to output a likelihood of maliciousness of the unknown site under analysis.
    Type: Grant
    Filed: July 29, 2020
    Date of Patent: August 1, 2023
    Assignee: Darktrace Holdings Limited
    Inventors: John Anthony Boyer, Matthew Dunn
  • Publication number: 20230237263
    Abstract: Systems, methods, devices, instructions, and other examples are described for natural language processing. One example includes accessing natural language processing general encoder data, where the encoder data is generated from a general-domain dataset that is not domain specific. A domain specific dataset is accessed and filtered encoder data using a subset of the encoder data is generated. The filtered encoder data is trained using the domain specific dataset to generate distilled encoder data, and tuning values for the distilled encoder data are generated to configure task outputs associated with the domain specific dataset.
    Type: Application
    Filed: December 23, 2022
    Publication date: July 27, 2023
    Applicant: LIVEPERSON, INC.
    Inventors: Kristen Howell, Jian Wang, Matthew Dunn, Joseph Bradley
  • Publication number: 20230224327
    Abstract: The email campaign detector checks whether clustered emails with similar characteristics are part of a targeted campaign of malicious emails. An email similarity classifier analyzes a group of emails in order to cluster emails with similar characteristics in the group of emails. A targeted campaign classifier analyzes the clustered emails with similar characteristics to check whether the clustered emails with similar characteristics are a) coming from a same threat actor b) going to a same intended target, and c) any combination of both, as well as ii) verify whether the clustered emails with similar characteristics are deemed malicious. The email campaign detector uses this information from the email similarity classifier and the targeted campaign classifier to provide an early warning system of a targeted campaign of malicious emails is underway. The email campaign detector cooperates with one or more machine learning models to identify emails that are deemed malicious.
    Type: Application
    Filed: March 3, 2023
    Publication date: July 13, 2023
    Inventors: Steven Haworth, Antony Lawson, Stephen Pickman, Matthew Dunn
  • Publication number: 20230188579
    Abstract: A method of coordinating real-time experiences of a realm among members of a group of users, the group of users including an administrative user and at least one participating user, is provided. The method includes transmitting by a server from a computing device of the administrative user, to a computing device of a first participating user of the group, in a real time session that allows the first participating user to experience the realm in real time, (a) data characterizing a series of locations in the realm, the series of locations comprising a first location and a second location, wherein the first location is associated with a first panoramic image and the second location is associated with a second panoramic image, and (b) executable code.
    Type: Application
    Filed: February 7, 2023
    Publication date: June 15, 2023
    Inventors: James Schoonmaker, Matthew Dunn, Keno Mullings
  • Patent number: 11676156
    Abstract: An intent confusion evaluation engine receives conversation data corresponding to conversations between customers and agents. The engine evaluates annotations in the conversation data corresponding to intents identified from messages exchanged between customers and agents to determine levels of confusion amongst different intents. Based on these levels of confusion, the engine creates a graphical representation that illustrates the various intents and the level of confusion between different pairings of intents for the set of conversations. If an update is provided to the annotations, the graphical representation is updated dynamically and in real-time to provide updated levels of confusion amongst the various intents in accordance with the update.
    Type: Grant
    Filed: May 24, 2022
    Date of Patent: June 13, 2023
    Assignee: LIVEPERSON, INC.
    Inventors: Matthew Dunn, Michael Higgins
  • Publication number: 20230132703
    Abstract: A cyber security system includes an importance node module to compute and use graphs to compute an importance of a node based on factors including a hierarchy and a job title of the user, aggregated account privileges from network domains and a level of shared resource access for the user. The graphs are supplied into an attack path modeling component to understand an importance of the network nodes and determine key pathways within the network that a cyber-attack would use, via a modeling the cyber-attack on a simulated and a virtual device version of the network. The cyber security system provides an intelligent prioritization of remediation action to a remediation suggester module to analyze results of the modeling the cyber-attack for each node and suggest how to perform intelligent prioritization of remediation action on a network node in one of a report and an autonomous remediation action.
    Type: Application
    Filed: October 31, 2022
    Publication date: May 4, 2023
    Applicant: Darktrace Holdings Limited
    Inventors: Marko Marsenic, Carl Joseph Salji, Jake Lal, Matthew Dunn