Patents by Inventor Micha Anthenor Benoliel
Micha Anthenor Benoliel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250045181Abstract: A method includes detecting, by an operator server, a mission at a blockchain server. The blockchain server is in communication with the operator server. The method also includes determining, by the operator server, whether the mission meets predefined criteria. In response to a determination that the mission meets the predefined criteria, the method includes exposing at least one device to the mission, the at least one device in communication with the operator server.Type: ApplicationFiled: December 13, 2022Publication date: February 6, 2025Applicant: NOODLE TECHNOLOGY INC.Inventors: Lucien Jean Baptiste Loiseau, Garrett Edward Kinsman, Micha Anthenor Benoliel, Eliott Quentin Eric Teissonniere
-
Patent number: 12125152Abstract: In one example, a method may include receiving a wireless signal from a device. The device may be within an environment. The method may also include identifying the device. The device may be identified based on at least one of data and metadata included in the wireless signal. In addition, the method may include determining a location of the device within the environment. The location of the device within the environment may be determined based on the data included the wireless signal. Further, the method may include displaying an augmented environment representative of the environment and a symbol representative of the device within the augmented environment. The symbol may be displayed in a location within the augmented environment corresponding to the location of the device within the environment.Type: GrantFiled: September 25, 2020Date of Patent: October 22, 2024Assignee: Noodle Technology Inc.Inventors: Micha Anthenor Benoliel, Garrett Edward Kinsman
-
Publication number: 20240235858Abstract: A compute device includes: a substrate; a circuit trace that is coupled to electronic components, wherein the electronic components include at least a processor, memory, and transceiver; a power source (battery and/or solar element) coupled with the electronic components; an antenna layer over the substrate that has at least one primary antenna element of at least one antenna assembly, wherein each antenna assembly is operationally coupled with the transceiver as a data communication link, and each primary antenna element is operationally coupled to the electronic components or power source as a structure of at least one ground plane for the respective primary antenna element; and a coupling member configured for being coupled to an object. In some aspects, the power source is selected from a, battery, solar element, or combinations thereof.Type: ApplicationFiled: February 19, 2022Publication date: July 11, 2024Applicant: NOODLE TECHNOLOGY, INCInventors: Garrett Edward Kinsman, Lucien Jean Baptiste Loiseau, Eliott Quentin Eric Teissonniere, Micha Anthenor Benoliel
-
Publication number: 20240137229Abstract: A compute device includes: a substrate; a circuit trace that is coupled to electronic components, wherein the electronic components include at least a processor, memory, and transceiver; a power source (battery and/or solar element) coupled with the electronic components; an antenna layer over the substrate that has at least one primary antenna element of at least one antenna assembly, wherein each antenna assembly is operationally coupled with the transceiver as a data communication link, and each primary antenna element is operationally coupled to the electronic components or power source as a structure of at least one ground plane for the respective primary antenna element; and a coupling member configured for being coupled to an object. In some aspects, the power source is selected from a, battery, solar element, or combinations thereof.Type: ApplicationFiled: February 19, 2022Publication date: April 25, 2024Applicant: NOODLE TECHNOLOGY, INCInventors: Garrett Edward Kinsman, Lucien Jean Baptiste Loiseau, Eliott Quentin Eric Teissonniere, Micha Anthenor Benoliel
-
Publication number: 20240112820Abstract: A method may include collecting from each of multiple endpoint devices a set of anonymized interactions of the corresponding endpoint device with other endpoint devices. Each anonymized interaction in the set of anonymized interactions may be based on an ephemeral unique identifier of another endpoint device involved in a corresponding anonymized interaction with the corresponding endpoint device. The method may include, for each endpoint device, resolving identities of the other endpoint devices with which the corresponding endpoint device has interacted from the corresponding set of anonymized interactions.Type: ApplicationFiled: December 12, 2023Publication date: April 4, 2024Applicant: Noodle Technology Inc.Inventors: Eliott Quentin Eric Teissonniere, Lucien Jean Baptiste Loiseau, Garrett Edward Kinsman, Micha Anthenor Benoliel
-
Patent number: 11842818Abstract: A method may include collecting from each of multiple endpoint devices a set of anonymized interactions of the corresponding endpoint device with other endpoint devices. Each anonymized interaction in the set of anonymized interactions may be based on an ephemeral unique identifier of another endpoint device involved in a corresponding anonymized interaction with the corresponding endpoint device. The method may include, for each endpoint device, resolving identities of the other endpoint devices with which the corresponding endpoint device has interacted from the corresponding set of anonymized interactions.Type: GrantFiled: April 29, 2021Date of Patent: December 12, 2023Assignee: Noodle Technology Inc.Inventors: Eliott Quentin Eric Teissonniere, Lucien Jean Baptiste Loiseau, Garrett Edward Kinsman, Micha Anthenor Benoliel
-
Publication number: 20230336539Abstract: In one example embodiment, a method may include testing a characteristic associated with a user and generating a signature file indicative of completion of the test of the characteristic associated with the user. The signature file may include results of the test of the characteristic associated with the user and a certificate indicative that the results of the test of the characteristic associated with the user is certified.Type: ApplicationFiled: April 30, 2021Publication date: October 19, 2023Inventors: Micha Anthenor BENOLIEL, Lucien LOISEAU, Eliott TEISSONNIERE, Garrett Kinsman
-
Publication number: 20230059496Abstract: A method for training a machine learning model includes obtaining camouflage material data. The method includes obtaining environmental data. The method also includes generating the machine learning model based on the camouflage material data and the environmental data. The method includes generating a plurality of camouflage patterns based on the machine learning model. The method includes assigning a rank to each of the camouflage patterns. The method further includes training the machine learning model with a camouflage pattern assigned with a highest rank.Type: ApplicationFiled: August 17, 2022Publication date: February 23, 2023Inventors: Garrett Edward Kinsman, Micha Anthenor Benoliel
-
Publication number: 20220398121Abstract: A method for communicating includes transmitting a code to a first device via a first network. The code is configured to execute on a virtual environment associated with the first device. When executed on the virtual environment, the code causes the first device to communicate with a second device via a second network. The first network is based on a first network protocol, and the second network is based on a second network protocol different from the first network protocol.Type: ApplicationFiled: June 10, 2022Publication date: December 15, 2022Inventors: Lucien Jean Baptiste Loiseau, Garrett Edward Kinsman, Micha Anthenor Benoliel, Eliott Quentin Eric Teissonniere
-
Publication number: 20220375176Abstract: In one example, a method may include receiving a wireless signal from a device. The device may be within an environment. The method may also include identifying the device. The device may be identified based on at least one of data and metadata included in the wireless signal. In addition, the method may include determining a location of the device within the environment. The location of the device within the environment may be determined based on the data included the wireless signal. Further, the method may include displaying an augmented environment representative of the environment and a symbol representative of the device within the augmented environment. The symbol may be displayed in a location within the augmented environment corresponding to the location of the device within the environment.Type: ApplicationFiled: September 25, 2020Publication date: November 24, 2022Inventors: Micha Anthenor BENOLIEL, Garrett Edward KINSMAN
-
Publication number: 20220337434Abstract: Disclosed are adaptable, auditable, and seamless provisioning systems, methods and processes that allow easy deployment and provisioning of devices and device components through a device manufacturing process and end user deployment. The systems and methods create a cryptographic proof that devices and associated components are authentic, securely set-up, and operated throughout the lifetime of the device. Methods and systems are provided to securely provision devices and components throughout a supply chain and deploy into an environment.Type: ApplicationFiled: April 15, 2022Publication date: October 20, 2022Inventors: Garrett Edward Kinsman, Lucien Jean Baptiste Loiseau, Eliott Quentin Eric Teissonniere, Micha Anthenor Benoliel
-
Publication number: 20220224547Abstract: In one example, a method may include generating a whitelist at a whitelisting authority, adding the whitelist to a PKI smart contract, adding one or more signing keys to the PKI smart contract, provisioning a device with a keypair by a manufacturer, sending a challenge to the device from a user, receiving a reply from the device at the user, and verifying a certificate and revocation status for the device by the user. The reply may include a challenge signature. The certificate and revocation status may be verified by the user using the PKI smart contract.Type: ApplicationFiled: September 16, 2020Publication date: July 14, 2022Inventors: Micha Anthenor BENOLIEL, Lucien LOISEAU, Eliott Quentin Eric TEISSONNIERE, Garrett Edward KINSMAN
-
Publication number: 20210385649Abstract: A method may include receiving, from an endpoint device, a request to register a service that is supported by the endpoint device, identifying, in view of the service identified in the request, a service provider of interest that relates to the service, receiving, from the endpoint device, a service connection request to initiate data flow related to the service, validating the endpoint device, and responsive to validating the endpoint device, establishing the service connection to a device associated with the service.Type: ApplicationFiled: August 24, 2021Publication date: December 9, 2021Inventors: Micha Anthenor Benoliel, Kyude Karyan
-
Publication number: 20210350938Abstract: A method may include collecting from each of multiple endpoint devices a set of anonymized interactions of the corresponding endpoint device with other endpoint devices. Each anonymized interaction in the set of anonymized interactions may be based on an ephemeral unique identifier of another endpoint device involved in a corresponding anonymized interaction with the corresponding endpoint device. The method may include, for each endpoint device, resolving identities of the other endpoint devices with which the corresponding endpoint device has interacted from the corresponding set of anonymized interactions.Type: ApplicationFiled: April 29, 2021Publication date: November 11, 2021Inventors: Eliott Quentin Eric Teissonniere, Lucien Jean Baptiste Loiseau, Garrett Edward Kinsman, Micha Anthenor Benoliel
-
Patent number: 11102650Abstract: A method may include receiving a beacon from a first intermediate device via a first network, the beacon being received by the first intermediate device from an endpoint device via a second network. The beacon may include a hash value based at least in part on the identity of the endpoint device and a time unit when the beacon was generated. The hash value of the beacon may be validated based on the identity of the endpoint device and the time unit when the beacon was generated. The beacon may be forwarded to a server via a third network in response to the hash value of the beacon being valid.Type: GrantFiled: May 14, 2019Date of Patent: August 24, 2021Assignee: Noodle Technology Inc.Inventors: Micha Anthenor Benoliel, Kyude Karyan
-
Publication number: 20210058376Abstract: A method may include generating a unique identifier for an endpoint device. The unique identifier may be specific to the endpoint device and may be configured to identify the endpoint device with at least one semi-trusted party. The unique identifier may be a hashed value based on both the endpoint device's MAC address and an operator secret known to a network operator. The method may include sharing the unique identifier with another device.Type: ApplicationFiled: August 23, 2020Publication date: February 25, 2021Inventors: Eliott Quentin Eric Teissonniere, Lucien Jean Baptiste Loiseau, Micha Anthenor Benoliel, Garrett Edward Kinsman
-
Patent number: 10839411Abstract: A system may include processing logic configured to execute instructions to cause a system to perform operations including receiving, from an intermediate device, data that originated at an endpoint node. The data may be associated with metadata that was associated with the data by the intermediate device. The operations may also include extracting one or more items from the metadata. The operations may include validating an activity of the intermediate device based on the one or more items that were extracted from the metadata.Type: GrantFiled: September 26, 2019Date of Patent: November 17, 2020Assignee: Noodle Technology Inc.Inventors: Micha Anthenor Benoliel, Garrett Kinsman, Lucien Loiseau, Eliott Teissonniere
-
Publication number: 20200202376Abstract: A system may include processing logic configured to execute instructions to cause a system to perform operations including receiving, from an intermediate device, data that originated at an endpoint node. The data may be associated with metadata that was associated with the data by the intermediate device. The operations may also include extracting one or more items from the metadata. The operations may include validating an activity of the intermediate device based on the one or more items that were extracted from the metadata.Type: ApplicationFiled: September 26, 2019Publication date: June 25, 2020Inventors: Micha Anthenor Benoliel, Garrett Kinsman, Lucien Loiseau, Eliott Teissonniere
-
Publication number: 20200128385Abstract: A system may include processing logic configured to execute instructions to cause a system to perform operations including receiving a beacon from a first intermediate device via a first network. The operations may also include identifying a characteristic of the beacon. The operations may include identifying, based on the characteristic of the beacon, a server that is associated with the beacon. The operations may include sending a beacon message to the server via a third network.Type: ApplicationFiled: October 15, 2019Publication date: April 23, 2020Inventors: Micha Anthenor Benoliel, Kyude Karyan
-
Publication number: 20190357040Abstract: A method may include receiving a beacon from a first intermediate device via a first network, the beacon being received by the first intermediate device from an endpoint device via a second network. The beacon may include a hash value based at least in part on the identity of the endpoint device and a time unit when the beacon was generated. The hash value of the beacon may be validated based on the identity of the endpoint device and the time unit when the beacon was generated. The beacon may be forwarded to a server via a third network in response to the hash value of the beacon being valid.Type: ApplicationFiled: May 14, 2019Publication date: November 21, 2019Inventors: Micha Anthenor Benoliel, Kyude Karyan