Patents by Inventor Michael Osborne
Michael Osborne has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250148351Abstract: A continuous meta-learning system operating at a server is described. In one aspect, a computer-implemented method includes accessing, at the server, a deployed machine learning model, metadata, and new prediction data for the deployed machine learning model, detecting a novel trend in the deployed machine learning model based on the new prediction data, generating label suggestions for the novel trend using metadata, querying a plurality of users to verify the label suggestions, detecting a consensus of the plurality of users, the consensus based on a rate of responses from the plurality of users that confirm the label suggestions, and in response to detecting the consensus, training a new machine learning model based on the new prediction data and the consensus of the plurality of users. The computer-implemented method also includes deploying the new machine learning model at the server.Type: ApplicationFiled: November 3, 2023Publication date: May 8, 2025Inventors: Francesca Garcia, Helen McKay, Bernardo Pérez Orozco, Davide Zilli, Joanna Crown, William Parr, Brian Mullins, Michael Osborne, Stephen Roberts, Alistair Garfoot, Nicholas Sherman, Adam James
-
Publication number: 20250139501Abstract: A machine learning platform operating at a server is described. The machine learning platform accesses a dataset from a datastore. A task that identifies a target of a machine learning algorithm from the machine learning platform is defined. The machine learning algorithm forms a machine learning model based on the dataset and the task. The machine learning platform deploys the machine learning model and monitors a performance of the machine learning model after deployment. The machine learning platform updates the machine learning model based on the monitoring.Type: ApplicationFiled: October 30, 2023Publication date: May 1, 2025Inventors: Alessandra Tosi, Robert Bell, Nathaniel Korda, Joanna Crown, Davide Zilli, Brian Mullins, Michael Osborne, Stephen Roberts, Alistair Garfoot
-
Publication number: 20250139706Abstract: A post-deployment drift detection monitoring of a predictive model is described. The method includes accessing a predictive performance metric of a machine learning model that is deployed at a server, the machine learning model being trained with an initial set of training data containing historical data, the predictive performance metric being based on the initial set of training data and an additional set of training data, the additional set of training data containing training data collected since training the machine learning model, detecting a drift based on the predictive performance metric exceeding a drift detection threshold, generating a drift warning notification to a client device, the drift warning notification indicating that the predictive performance metric exceeds the drift detection threshold, receiving a user feedback from the client device, and adjusting one of the machine learning model or the drift detection threshold based on the user feedback.Type: ApplicationFiled: October 30, 2023Publication date: May 1, 2025Inventors: Helen Mckay, Bernardo pérez Orozco, Francesca Garcia, Davide Zilli, Brian Mullins, Michael Osborne, Stephen Roberts, Nicholas Sherman
-
Publication number: 20250141850Abstract: A system for private and secure data portal is described. A method includes receiving, from a first client device, a permission request and a data request for a first dataset that is stored at a second client device, providing the permission request and the data request to the second client device, the second client device configured to generate, in response to the permission request and the data request, a data usage approval document and an encrypted synthesized dataset corresponding to the data usage approval document, the encrypted synthesized dataset includes a synthetic second dataset representative of the first dataset, receiving, from the second client device, the data usage approval document and the encrypted synthesized dataset, performing, at a server, a computation on the encrypted synthesized dataset based on the data request, and providing the data usage approval document and results of the computation to the first client device.Type: ApplicationFiled: October 30, 2023Publication date: May 1, 2025Inventors: Patrick Tunney, Nathaniel Korda, Brian Mullins, Michael Osborne, Stephen Roberts, Davide Zilli, Alistair Garfoot
-
Publication number: 20240084654Abstract: An environmental-efficiency fluid is designed by a system and/or method. The fluid can be for use in a down-hole operation in a well. The design produces the environmental-efficiency fluid from a treatment fluid and drill cuttings. For example, the system and method can include creating an analysis of a rheological model generated from a set of wellbore conditions and a set of drill-cutting properties to determine a set of rheological properties for the treatment fluid and a concentration of drill cuttings, which allow for use of the drill cuttings with the treatment fluid; and producing the environmental-efficiency fluid based on the rheological properties and the concentration of drill cuttings.Type: ApplicationFiled: September 14, 2022Publication date: March 14, 2024Inventors: James Robert Benkley, Ronnie Glen Morgan, Stephanie Ruiz, Paul Michael Osborne, Thomas Pisklak
-
Publication number: 20230366303Abstract: A method of classifying job observations with metadata tags for retrieval from a database during the designing of a wellbore treatment. A machine learning process applies a set of metadata tags to the observation description and observation object based on a training set of job observations. The machine learning process validates the metadata tags based on a classification grade determined by the ranking of the job observation within a search result. A managing application can modify a job design comprising an inventory of wellbore treatment materials and pumping equipment based on job observations with metadata tags that match the metadata tags of the job design.Type: ApplicationFiled: May 13, 2022Publication date: November 16, 2023Inventors: MARJORIE FARMER, PAUL MICHAEL OSBORNE
-
Publication number: 20230051106Abstract: Embodiments are generally directed to systems and apparatuses for tracking usage of an item. For example, an apparatus may be provided for tracking use of a packetized item. The apparatus may include a microprocessor, a power source, and a structural layer to which the microprocessor and power source are coupled. The structural layer may include a container that is configured to hold various items. The container may also include an opening that allows access to the items. The apparatus may further include a cover layer that is configured to cover the opening of the container. The cover layer may include at least one bendable sensor placed over the opening of the container. The microprocessor may be configured to determine, using detected movements in the bendable sensor, whether the container has been opened.Type: ApplicationFiled: October 31, 2022Publication date: February 16, 2023Inventors: Michael Osborne Isom, Duane Michael Scott Johnson, Lance Squire, Joseph Arthur Harris, David Brewster Beck
-
Patent number: 11578999Abstract: Embodiments are generally directed to systems and apparatuses for tracking usage of an item. For example, an apparatus may be provided for tracking use of a packetized item. The apparatus may include a microprocessor, a power source, and a structural layer to which the microprocessor and power source are coupled. The structural layer may include a container that is configured to hold various items. The container may also include an opening that allows access to the items. The apparatus may further include a cover layer that is configured to cover the opening of the container. The cover layer may include at least one bendable sensor placed over the opening of the container. The microprocessor may be configured to determine, using detected movements in the bendable sensor, whether the container has been opened.Type: GrantFiled: May 21, 2019Date of Patent: February 14, 2023Assignee: Counted, LLCInventors: Michael Osborne Isom, Duane Michael Scott Johnson, Lance Squire, Joseph Arthur Harris, David Brewster Beck
-
Patent number: 11365341Abstract: A method of servicing a wellbore in a formation comprising circulating in the wellbore a wellbore servicing fluid wherein an equivalent circulating density of the wellbore servicing fluid is from about 1% to about 15% greater than a fracture pressure of the formation, and introducing to the wellbore a balloon-inhibiting tunable spacer (BITS) fluid wherein at least about 1 wt. % of the BITS fluid is retained by the formation.Type: GrantFiled: May 29, 2020Date of Patent: June 21, 2022Assignee: Halliburton Energy Services, Inc.Inventors: Sandip Prabhakar Patil, Kyriacos Agapiou, Paul Michael Osborne, Ganesh Shriniwas Pangu
-
Patent number: 11337896Abstract: In one example, the present disclosure describes a device, computer-readable medium, and method for monitoring a patient's medication adherence. In one example, an apparatus includes a set of contact pins to electrically engage a conductive trace circuit of a unit dose packaging and to generate a signal in response to a break in the conductive trace circuit, a processor comprising a plurality of analog channels to detect and record the signal, a cellular modem to send, via a data network to which the apparatus is connected, information about the signal to a medication adherence monitoring service, a housing containing the set of contact pins, the processor, and the cellular modem, wherein the housing is configured for removable insertion of the unit dose packaging, and a lock to reversibly lock the unit dose packaging in the housing.Type: GrantFiled: October 26, 2020Date of Patent: May 24, 2022Assignee: AT&T Intellectual Property I, L.P.Inventors: Mohamed Ahmed Mohamed Elmahdy, Shaoda Yu, Nadia Morris, Duane Michael Scott Johnson, Michael Osborne Isom, Steven Todd Barth
-
Publication number: 20210371722Abstract: A method of servicing a wellbore in a formation comprising circulating in the wellbore a wellbore servicing fluid wherein an equivalent circulating density of the wellbore servicing fluid is from about 1% to about 15% greater than a fracture pressure of the formation, and introducing to the wellbore a balloon-inhibiting tunable spacer (BITS) fluid wherein at least about 1 wt. % of the BITS fluid is retained by the formation.Type: ApplicationFiled: May 29, 2020Publication date: December 2, 2021Inventors: Sandip Prabhakar PATIL, Kyriacos AGAPIOU, Paul Michael OSBORNE, Ganesh Shriniwas PANGU
-
Publication number: 20210038478Abstract: In one example, the present disclosure describes a device, computer-readable medium, and method for monitoring a patient's medication adherence. In one example, an apparatus includes a set of contact pins to electrically engage a conductive trace circuit of a unit dose packaging and to generate a signal in response to a break in the conductive trace circuit, a processor comprising a plurality of analog channels to detect and record the signal, a cellular modem to send, via a data network to which the apparatus is connected, information about the signal to a medication adherence monitoring service, a housing containing the set of contact pins, the processor, and the cellular modem, wherein the housing is configured for removable insertion of the unit dose packaging, and a lock to reversibly lock the unit dose packaging in the housing.Type: ApplicationFiled: October 26, 2020Publication date: February 11, 2021Inventors: Mohamed Ahmed Mohamed Elmahdy, Shaoda Yu, Nadia Morris, Duane Michael Scott Johnson, Michael Osborne Isom, Steven Todd Barth
-
Patent number: 10813842Abstract: In one example, the present disclosure describes a device, computer-readable medium, and method for monitoring a patient's medication adherence. In one example, an apparatus includes a set of contact pins to electrically engage a conductive trace circuit of a unit dose packaging and to generate a signal in response to a break in the conductive trace circuit, a processor comprising a plurality of analog channels to detect and record the signal, a cellular modem to send, via a data network to which the apparatus is connected, information about the signal to a medication adherence monitoring service, a housing containing the set of contact pins, the processor, and the cellular modem, wherein the housing is configured for removable insertion of the unit dose packaging, and a lock to reversibly lock the unit dose packaging in the housing.Type: GrantFiled: November 4, 2019Date of Patent: October 27, 2020Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.Inventors: Mohamed Ahmed Mohamed Elmahdy, Shaoda Yu, Nadia Morris, Duane Michael Scott Johnson, Michael Osborne Isom, Steven Todd Barth
-
Publication number: 20200155416Abstract: In one example, the present disclosure describes a device, computer-readable medium, and method for monitoring a patient's medication adherence. In one example, an apparatus includes a set of contact pins to electrically engage a conductive trace circuit of a unit dose packaging and to generate a signal in response to a break in the conductive trace circuit, a processor comprising a plurality of analog channels to detect and record the signal, a cellular modem to send, via a data network to which the apparatus is connected, information about the signal to a medication adherence monitoring service, a housing containing the set of contact pins, the processor, and the cellular modem, wherein the housing is configured for removable insertion of the unit dose packaging, and a lock to reversibly lock the unit dose packaging in the housing.Type: ApplicationFiled: November 4, 2019Publication date: May 21, 2020Inventors: Mohamed Ahmed Mohamed Elmahdy, Shaoda Yu, Nadia Morris, Duane Michael Scott Johnson, Michael Osborne Isom, Steven Todd Barth
-
Publication number: 20190355462Abstract: Embodiments are generally directed to systems and apparatuses for tracking usage of an item. For example, an apparatus may be provided for tracking use of a packetized item. The apparatus may include a microprocessor, a power source, and a structural layer to which the microprocessor and power source are coupled. The structural layer may include a container that is configured to hold various items. The container may also include an opening that allows access to the items. The apparatus may further include a cover layer that is configured to cover the opening of the container. The cover layer may include at least one bendable sensor placed over the opening of the container. The microprocessor may be configured to determine, using detected movements in the bendable sensor, whether the container has been opened.Type: ApplicationFiled: May 21, 2019Publication date: November 21, 2019Inventors: Michael Osborne Isom, Duane Michael Scott Johnson, Lance Squire, Joseph Arthur Harris, David Brewster Beck
-
Patent number: 10463574Abstract: In one example, the present disclosure describes a device, computer-readable medium, and method for monitoring a patient's medication adherence. In one example, an apparatus includes a set of contact pins to electrically engage a conductive trace circuit of a unit dose packaging and to generate a signal in response to a break in the conductive trace circuit, a processor comprising a plurality of analog channels to detect and record the signal, a cellular modem to send, via a data network to which the apparatus is connected, information about the signal to a medication adherence monitoring service, a housing containing the set of contact pins, the processor, and the cellular modem, wherein the housing is configured for removable insertion of the unit dose packaging, and a lock to reversibly lock the unit dose packaging in the housing.Type: GrantFiled: November 19, 2018Date of Patent: November 5, 2019Assignee: AT&T Intellectual Property I, L.P.Inventors: Mohamed Ahmed Mohamed Elmahdy, Shaoda Yu, Nadia Morris, Duane Michael Scott Johnson, Michael Osborne Isom, Steven Todd Barth
-
Patent number: 10397008Abstract: A security device (6) is provided for facilitating management of secret data items such as cryptographic keys which are used by a remote server (2) to authenticate operations of the server (2). The device (6) has a user interface (13), control logic (16) and a computer interface (11) for connecting the device (6) to a local user computer (5) for communication with the remote server (2) via a data communications network (3). The control logic is adapted to establish via the user computer (5) a mutually-authenticated connection for encrypted end-to-end communications between the device (6) and server (2). In a backup operation, the secret data items are received from the server (2) via this connection. The control logic interacts with the user via the user interface (13) to obtain user authorization to backup secret data items and, in response, stores the secret data items in memory (10).Type: GrantFiled: June 8, 2018Date of Patent: August 27, 2019Assignee: International Business Machines CorporationInventors: Michael Baentsch, Harold Dykeman, Michael Osborne, Tamas Visegrady
-
Publication number: 20180294980Abstract: A security device (6) is provided for facilitating management of secret data items such as cryptographic keys which are used by a remote server (2) to authenticate operations of the server (2). The device (6) has a user interface (13), control logic (16) and a computer interface (11) for connecting the device (6) to a local user computer (5) for communication with the remote server (2) via a data communications network (3). The control logic is adapted to establish via the user computer (5) a mutually-authenticated connection for encrypted end-to-end communications between the device (6) and server (2). In a backup operation, the secret data items are received from the server (2) via this connection. The control logic interacts with the user via the user interface (13) to obtain user authorization to backup secret data items and, in response, stores the secret data items in memory (10).Type: ApplicationFiled: June 8, 2018Publication date: October 11, 2018Inventors: Michael BAENTSCH, Harold DYKEMAN, Michael OSBORNE, Tamas VISEGRADY
-
Publication number: 20170248401Abstract: Embodiments are directed to apparatuses, methods and systems for tracking usage of an item. In one scenario, a microcontroller is configured to send a periodic signal over electrical traces that are distributed over an item to determine whether a change in electrical throughput has occurred in a trace. Upon determining that such a change has occurred, an indication is generated that describes the type of usage that occurred and the time at which the use occurred. An indication of the type of usage and the time of occurrence is then provided to specified recipients. Apparatuses for tracking such usage include a battery, a microprocessor, a transmitter and capsules for storing the controlled substances. Each capsule has an electrical trace extending through at least some of the capsule. The microprocessor is configured to determine, using the electrical traces, which capsules have been opened by identifying which traces have been broken.Type: ApplicationFiled: February 27, 2017Publication date: August 31, 2017Inventors: Michael Osborne Isom, Duane Michael Scott Johnson
-
Patent number: 8302173Abstract: A method for providing a user device with a set of access codes comprises, in the user device, storing an encryption key a an identification code, and sending a message containing the identification code to a server via a communications network. In the server, an encryption key is stored corresponding to the key stored in the user device, allocating the set of access codes on receipt of the identification code from the user device. A look up function is performed based on the identification code received in the message to retrieve the key from storage. The set of access codes is encrypted using the retrieved key to produce an encrypted set. A message containing the encrypted set is sent to the user device via the network. In the user device, the encrypted set received from the server is decrypted using the key in storage, and storing the decrypted set of access codes for use by a user of the user device.Type: GrantFiled: May 22, 2008Date of Patent: October 30, 2012Assignee: International Business Machines CorporationInventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Frank Hoering, Thorsten Kramp, Marcus Oestreicher, Michael Osborne, Thomas D. Weigold