Patents by Inventor Max Smith
Max Smith has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250111019Abstract: A method, computer system and computer program are provided for validating a secure authentication token for accessing an application. The method captures a user gesture provided by a user as an authentication token and analyses the gesture to evaluate a measure of complexity of the gesture. Responsive to a determination that the measure of complexity does not meet a minimum measure of complexity, repeating the capturing and analysing steps until the gesture meets the defined measure of complexity. Then the user is requested to repeat the approved gesture and the repeated gesture is captured, and it is determined if the repeated gesture meets defined requirements for repeatability. Responsive to a determination that the repeated gesture does not meet the requirements for repeatability, the method is repeated; and, responsive to a determination that the repeated gesture does meet the requirements for repeatability, the gesture is validated as a secure authentication token.Type: ApplicationFiled: February 27, 2023Publication date: April 3, 2025Inventors: Jonathan ROSCOE, Max SMITH-CREASEY, Tiago MARTINS ANDRADE
-
Publication number: 20250111027Abstract: A method, computer system and computer program are provided for achieving a secure authentication token for accessing an application. The method captures a user gesture provided by a user as an authentication token and analyses the gesture to evaluate a measure of complexity of the gesture. Responsive to a determination that the measure of complexity does not meet a minimum measure of complexity, an amendment is determined and proposed to the gesture to increase a complexity of the gesture. The capturing and analysing steps are repeated, and, responsive to a determination that the gesture meets the minimum measure of complexity, the gesture is approved as a secure authentication token.Type: ApplicationFiled: February 27, 2023Publication date: April 3, 2025Inventors: Tiago MARTINS ANDRADE, Jonathan ROSCOE, Max SMITH-CREASEY
-
Patent number: 12250214Abstract: The present disclosure relates to the security of user devices connected to local networks, such as devices comprised in the Internet of Things' (IoT). An aspect relates to a computer-implemented method of securing functionality of a user device connected to a local network provided at a premises, the method comprising: determining a premises trust score indicative of a likelihood that an authorised user of the user device is present at the premises, the determining being in dependence on: (i) data received from one or more biometric-capable devices, distinct from the user device, connected to the local network, that data being indicative of continuous biometric authentication of a current user of the respective biometric-capable device; or (ii) a lack thereof; then causing the user device to respond to a request for functionality made through a local user interface it comprises in a manner which depends on the premises trust score.Type: GrantFiled: February 17, 2021Date of Patent: March 11, 2025Assignee: BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANYInventor: Max Smith-Creasey
-
Publication number: 20250054406Abstract: User personality traits classification for adaptive virtual environments in non-linear story paths A method of providing adaptive training to a user in a training environment is provided. The method comprises generating, by a machine learning agent, a training scenario for a user, wherein the training scenario is generated based on a personality biometric profile and one or more personality characteristics of the user. The user is trained in a training session using the training scenario wherein, during the training session, the machine learning agent modifies the training scenario in real time based on user behavioural data that reflects the user's behaviour in the training session.Type: ApplicationFiled: November 23, 2022Publication date: February 13, 2025Inventors: Tiago ANDRADE, Anasol PENA-RIOS, Max SMITH-CREASEY, Ozkan BAHCECI
-
Publication number: 20250029510Abstract: A method for providing adaptive training to a user is provided. The method comprises receiving user biometric data from a plurality of user devices, and generating a personality biometric profile based on the user biometric data, where the personality biometric profile comprises one or more personality characteristics of the user based on the user biometric data. A training scenario is generated for the user based on the user biometric profile, and the user is trained using the generated training scenario in a training session, wherein user behavioural data is collected in real time during the training session. The user biometric profile is updated based on the collected user behavioural data, and the training scenario is updated for the user subsequent to the training session based on the updated user profile.Type: ApplicationFiled: November 23, 2022Publication date: January 23, 2025Inventors: Tiago ANDRADE, Anasol PENA-RIOS, Max SMITH-CREASEY, Ozkan BAHCECI
-
Publication number: 20240394332Abstract: A computer implemented method for detecting the existence of a condition indicated by a signature vector sequence of events in an input vector sequence of events, each of the signature and input vector sequences being constituted by an ordered sequence of vectors, can include converting the signature vector sequence into an signature ordered numerical sequence in which each vector in the signature vector sequence is converted to a number indicative of a magnitude of the vector such that the signature numerical sequence is a sequence of magnitudes in the order of the signature vector sequence; converting the input vector sequence into an input ordered numerical sequence in which each vector in the input vector sequence is converted to a number indicative of a magnitude of the vector such that the input numerical sequence is a sequence of magnitudes in the order of the input vector sequence; and determining a degree of similarity of the signature numerical sequence and the input numerical sequence to detect theType: ApplicationFiled: August 24, 2022Publication date: November 28, 2024Inventors: Jonathan ROSCOE, Robert HERCOCK, Max SMITH-CREASEY
-
Publication number: 20240169047Abstract: The authentication of a user across multiple devices includes the generation of authentication related data during an authentication process of a first device. The authentication process relating to a user's use of a second device is conducted in dependence on the authentication data generated during the authentication process of the first device. The authentication data may include the authentication readings that have been authenticated by the first device, a trust in the user, a location of the user, a proximity of the user to the device in use and a network device, and a time elapsed since the authentication process occurred on the first device. Beneficially, basing the authentication of a second device on the authentication process of a first device allows a trust in the user to be transferred.Type: ApplicationFiled: February 16, 2022Publication date: May 23, 2024Inventors: Max SMITH-CREASEY, Fadi EL-MOUSSA
-
Publication number: 20240073207Abstract: A computer implemented method for authenticating a user, the method including receiving an authentication request from a first computer system, the authentication request including an indication of an identity of the user to be authenticated; receiving one or more authentication factors for verifying the identity of the user, the one or more authentication factors including at least one authentication factor obtained from a second computer system associated with the user having the indicated identity; receiving an auxiliary authentication factor, the auxiliary authentication factor comprising data for verifying that the second computer system is currently in the possession of the user having the indicated identity; and verifying the identity of the user based on the one or more authentication factors and the auxiliary authentication factor.Type: ApplicationFiled: November 25, 2021Publication date: February 29, 2024Inventors: Gabriele GELARDI, Max SMITH-CREASEY, Gery DUCATEL
-
Publication number: 20240056452Abstract: A computer implemented method of controlling access by a requesting user to a restricted resource in an extended reality environment, the method comprising: permitting access, by the requesting user, to the restricted resource; monitoring characteristics of the requesting user during use of the restricted resource, the characteristics including one or more of biometric and behavioural information for the user accessing the resource; accessing a profile data store containing a plurality of profiles of users having accessed the restricted resource, each profile including at least one of biometric and behavioural information for a respective user accessing the resource; responsive to a determination that the characteristics of the requesting user corresponds to at least one profile, inhibiting access, by the requesting user, to the restricted resource.Type: ApplicationFiled: December 1, 2021Publication date: February 15, 2024Inventors: Max SMITH-CREASEY, Oliver BAXANDALL, Tiago ANDRADE
-
Publication number: 20230148327Abstract: The present disclosure relates to improving ways of making decisions made by, or with the assistance of, computing systems. One aspect relates to a computer-implemented continuous control method, the method comprising: obtaining a policy decision according to an application of a policy to an inference; the inference being of an authorised user's state of mind over a time interval, determined according to a plurality of biometric readings obtained passively from the user over the time interval for continuous authentication of the user; the user's identity having been continuously authenticated according to the plurality of biometric readings; and causing one or more actions in accordance with the policy decision.Type: ApplicationFiled: February 19, 2021Publication date: May 11, 2023Inventor: Max SMITH-CREASEY
-
Publication number: 20230118093Abstract: A computer implemented method to protect data input to a user input device from detection, the device including an artificial haptic feedback mechanism arranged to generate an occurrence of haptic feedback for sensing by a user of the device in response to each input gesture on the device by the user, wherein at least a subset of each occurrence of haptic feedback is adjusted with respect to a previous occurrence of haptic feedback by one or more of: a timing of the haptic feedback with respect to a time of occurrence of a corresponding input gesture; an adjustment to a duration of haptic feedback relative to a duration of the previous occurrence of haptic feedback; and a generation of one or more addition occurrences of haptic feedback.Type: ApplicationFiled: February 23, 2021Publication date: April 20, 2023Inventors: Jonathan ROSCOE, Max SMITH-CREASEY
-
Publication number: 20230108872Abstract: The present disclosure relates to the security of user devices connected to local networks, such as devices comprised in the Internet of Things' (IoT). An aspect relates to a computer-implemented method of securing functionality of a user device connected to a local network provided at a premises, the method comprising: determining a premises trust score indicative of a likelihood that an authorised user of the user device is present at the premises, the determining being in dependence on: (i) data received from one or more biometric-capable devices, distinct from the user device, connected to the local network, that data being indicative of continuous biometric authentication of a current user of the respective biometric-capable device; or (ii) a lack thereof; then causing the user device to respond to a request for functionality made through a local user interface it comprises in a manner which depends on the premises trust score.Type: ApplicationFiled: February 17, 2021Publication date: April 6, 2023Inventor: Max SMITH-CREASEY
-
Patent number: 9675216Abstract: A convolutely wound material having a tail and a body. The tail is bonded to the body with foamed adhesive.Type: GrantFiled: April 14, 2015Date of Patent: June 13, 2017Assignee: The Procter & Gamble CompanyInventors: Wesley Bernard Brokopp, Jr., James Max Smith
-
Publication number: 20160302625Abstract: A convolutely wound material having a tail and a body. The tail is bonded to the body with foamed adhesive.Type: ApplicationFiled: April 14, 2015Publication date: October 20, 2016Inventors: Wesley Bernard Brokopp, JR., James Max Smith
-
Patent number: 9382086Abstract: A method for bonding the tail of a convolutely wound log to the body is provided. The method comprises the use of a nonadhesive phase-change material to mechanically bond the tail to the wound log. The nonadhesive phase-change material is heated to an amorphous state prior to its application. Once applied to the wound log, the nonadhesive phase-change material mechanical bonds with the tail and wound log and as heat is lost, changes to a non-amorphous state. The mechanical bond can be selectively reversed through the application of a strength degradation accelerator.Type: GrantFiled: June 30, 2014Date of Patent: July 5, 2016Assignee: The Procter & Gamble CompanyInventors: Gustav Andre Mellin, Eric Joseph Biegger, Victoria Grace Strain, Wesley Bernard Brokopp, Jr., David Mark Rasch, James Max Smith
-
Publication number: 20150375951Abstract: A method for bonding the tail of a convolutely wound log to the body is provided. The method comprises the use of a nonadhesive phase-change material to mechanically bond the tail to the wound log. The nonadhesive phase-change material is heated to an amorphous state prior to its application. Once applied to the wound log, the nonadhesive phase-change material mechanical bonds with the tail and wound log and as heat is lost, changes to a non-amorphous state. The mechanical bond can be selectively reversed through the application of a strength degradation accelerator.Type: ApplicationFiled: June 30, 2014Publication date: December 31, 2015Inventors: Gustav Andre MELLIN, Eric Joseph BIEGGER, Victoria Grace STRAIN, Wesley Bernard BROKOPP, JR., David Mark RASCH, James Max SMITH
-
Publication number: 20140131498Abstract: An apparatus and method for adhesively bonding the tail of a convolutely wound log to the body is provided. The apparatus comprises a tail identifying system, spray nozzle adhesive application system and tail winding system. The spray nozzle application system comprises a plurality of nozzles, each nozzle having a discharge portion configured to spray a foaming adhesive in a predetermined deposit pattern to form a line of adhesive. The method comprises the steps of: providing a sealing station with a tail identifying and a spray nozzle adhesive application system comprising a plurality of nozzles; spraying the foaming adhesive, each nozzle spraying the foaming adhesive in a predetermined deposit pattern to form a line of adhesive; and reattaching the tail to the body at the line of adhesive. A convolutely wound material having a tail and a body, where the tail is bonded to the body with foaming adhesive, is provided.Type: ApplicationFiled: March 13, 2013Publication date: May 15, 2014Inventors: Wesley Bernard BROKOPP, JR., James Max SMITH, David Mark RASCH
-
Publication number: 20130091768Abstract: A door control apparatus and methods for controlling a door motion device for a hinged door and, optionally, illuminating a designated area on the floor. During the time the designated area is illuminated, a person can expect that the door will not close. The door control apparatus may include control circuitry, and a sensor, and optionally a light emitter and/or a sound emitter. The sensor detects a person proximate to the door and signals the control circuitry upon a detection event. The light emitter is also connected to the control circuitry. Upon a detection event, the control circuitry signals the light emitter to produce light and signals the door motion device to hold the door open. The light emitter directs light to form an image on the floor in the designated area. The light emitter may be, for example, a laser generator or a light emitting diode lamp.Type: ApplicationFiled: March 11, 2011Publication date: April 18, 2013Applicant: YALE SECURITY INC.Inventors: Blue Houser, Tommy McNally, Michael Webb, Max Smith, Asa Christiander
-
Publication number: 20090319789Abstract: The invention consists of a system of integrated components comprised of at least one portable data storage device, a secure server based system to warehouse data within a database and an image of the computer readable media on the portable data storage device, and a user interface to the secure server. It is contemplated that access to the secure server can be accomplished through a browser via the internet, an intranet, or an extranet. It is further contemplated that a secure client/server arrangement could permit direct access to the database. A client/server arrangement could be of a thin-client or fat-client type architecture. Users would require only a minimal amount of interaction with the system for the purpose of editing information and uploading files, while health care providers would require greater access and reporting for the purpose of facilitating the delivery of appropriate care.Type: ApplicationFiled: April 14, 2009Publication date: December 24, 2009Inventors: Larry Wendell Wilson, James Max Smith, Barbara Griec
-
Patent number: 7305581Abstract: A platform for and method of computer processing to support processor failover are disclosed. A plurality of computer processors are connected to an internal communication network. A virtual local area communication network over the internal network is defined and established. Each computer processor in the virtual local area communication network has a corresponding virtual MAC address and the virtual local area network provides communication among a set of computer processors but excludes the processors from the plurality not in the defined set. A virtual storage space is defined and established with a defined correspondence to the address space of the storage network. In response to a failure by a computer processor, a computer processor from the plurality is allocated to replace the failed processor. The MAC address of the failed processor is assigned to the processor that replaces the failed processor.Type: GrantFiled: October 13, 2005Date of Patent: December 4, 2007Assignee: Egenera, Inc.Inventors: Scott Geng, Pete Manca, Paul Curtis, Ewan Milne, Max Smith, Alan Greenspan, Edward Duffy, Peter Schulter