Patents by Inventor Nathaniel Kim

Nathaniel Kim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11959072
    Abstract: This invention relates to compositions and methods for modifying Homeodomain-leucine zipper (HD-Zip) transcription factors in plants to suppress shade avoidance response in plants. The invention further relates to plants produced using the methods and compositions of the invention.
    Type: Grant
    Filed: January 29, 2021
    Date of Patent: April 16, 2024
    Assignee: Pairwise Plants Services, Inc.
    Inventors: Nicholas Bate, Yongjoo Kim, Nathaniel Graham, Julius Mojica
  • Publication number: 20240093186
    Abstract: The disclosure provides, e.g., compositions, systems, and methods for targeting, editing, modifying, or manipulating a host cell's genome at one or more locations in a DNA sequence in a cell, tissue, or subject. Gene modifying systems for treating cystic fibrosis, e.g., in subjects having a mutation resulting in F508del, are described.
    Type: Application
    Filed: September 20, 2023
    Publication date: March 21, 2024
    Inventors: Robert Charles Altshuler, Anne Helen Bothmer, Daniel Raymond Chee, Cecilia Giovanna Silvia Cotta-Ramusino, Kyusik Kim, Randi Michelle Kotlar, Gregory David McAllister, Aamir Mir, Ananya Ray, Nathaniel Roquet, Carlos Sanchez, Barrett Ethan Steinberg, Robert James Citorik, William Edward Salomon, William Querbes, Luciano Henrique Apponi, Zhan Wang
  • Publication number: 20240082429
    Abstract: The disclosure provides, e.g., compositions, systems, and methods for targeting, editing, modifying, or manipulating a host cell's genome at one or more locations in a DNA sequence in a cell, tissue, or subject. Gene modifying systems for treating phenylketonuria (PKU) are described.
    Type: Application
    Filed: October 26, 2023
    Publication date: March 14, 2024
    Inventors: Robert Charles Altshuler, Anne Helen Bothmer, Daniel Raymond Chee, Cecilia Giovanna Silvia Cotta-Ramusino, Kyusik Kim, Randi Michelle Kotlar, Gregory David McAllister, Ananya Ray, Nathaniel Roquet, Carlos Sanchez, Barrett Ethan Steinberg, William Edward Salomon, Robert James Citorik, William Querbes, Luciano Henrique Apponi, Zhan Wang
  • Publication number: 20240084334
    Abstract: The disclosure provides, e.g., compositions, systems, and methods for targeting, editing, modifying, or manipulating a host cell's genome at one or more locations in a DNA sequence in a cell, tissue, or subject. Gene modifying systems for treating alpha-1 antitrypsin deficiency (AATD) are described.
    Type: Application
    Filed: September 18, 2023
    Publication date: March 14, 2024
    Inventors: Robert Charles Altshuler, Anne Helen Bothmer, Daniel Raymond Chee, Cecilia Giovanna Silvia Cotta-Ramusino, Kyusik Kim, Randi Michelle Kotlar, Gregory David McAllister, Ananya Ray, Nathaniel Roquet, Carlos Sanchez, Barrett Ethan Steinberg, William Edward Salomon, Robert James Citorik, William Querbes, Luciano Henrique Apponi, Zhan Wang
  • Patent number: 11925812
    Abstract: The present technology generally includes devices, systems, and methods for providing electrical stimulation to the left ventricle of a human heart in a patient suffering from Left Bundle Branch Block (LBBB). In particular, the present technology includes an implantable receiver-stimulator and an implantable controller-transmitter for leadless electrical stimulation of the heart. The receiver-stimulator can include one or more sensors capable of detecting the electrical conduction of the heart and the receiver-stimulator can be configured to pace the stimulation of the left ventricle based off the sensed electrical conduction to achieve synchronization of the left and right ventricles.
    Type: Grant
    Filed: February 8, 2022
    Date of Patent: March 12, 2024
    Assignee: EBR SYSTEMS, INC.
    Inventors: Steven Kim, Nathaniel Parker Willis
  • Publication number: 20080077989
    Abstract: A method of operating an intrusion detection system. The system determines occurrence of a signature event indicative of a denial of service intrusion on a protected device. A value of a signature event counter is increased. The value of the signature event counter is adjusted to not include a count of signature events past a sliding window. The value of the signature event counter is determined to exceed a signature threshold quantity, followed by generation of an alert at a time subsequently recorded in a log. The log is cleared of entries past a permissible age. A present alert generation rate is determined as a ratio of the total number of timestamps in the log to the permissible age. The present alert generation rate is ascertained to exceed an alert generation rate threshold. A selected element of the signature set is altered to decrease the alert generation rate.
    Type: Application
    Filed: August 20, 2007
    Publication date: March 27, 2008
    Inventors: Jeffrey Bardsley, Ashley Brock, Nathaniel Kim, Charles Lingafelt
  • Publication number: 20080046211
    Abstract: In general, the present invention provides a method and system for calibrating an electrical device that utilizes a data networking protocol (e.g., 802.1X) over a power delivery network. Specifically, the present invention leverages information gathered and stored during the authentication and operation of the electrical device to determine whether the electrical device should be calibrated. In general, the present invention makes this determination based on time elapsed since a previous calibration and/or cumulative usage of the device.
    Type: Application
    Filed: September 12, 2007
    Publication date: February 21, 2008
    Inventors: Nathaniel Kim, Charles Lingafelt
  • Publication number: 20070157308
    Abstract: An authenticator is configured with intelligence for the purpose of providing a “failsafe” mode for port-based authentication (802.1x). This failsafe mode enables end users to access a network when communication between the authenticator and the authentication server has temporarily failed, but keeps security measures in place so that unauthorized users cannot gain network access. An 802.1x access control point (e.g., a switch) is enabled to continue to authenticate certain users onto the network during periods of temporary communication failure with the authentication server, by locally storing alternative authentication information limited to historical authentication information of clients that have previously accessed the network via the authentication server. Subsequent revalidation of specific users using the primary authentication information follows restoration of communication with the authentication server.
    Type: Application
    Filed: January 3, 2006
    Publication date: July 5, 2007
    Inventors: Jeffrey Bardsley, Nathaniel Kim, Charles Lingafelt, Allen Roginsky
  • Publication number: 20070038866
    Abstract: Method, system, and program product for port based authentication protocols where addresses are dynamically assigned within a network environment, and more particularly to port based authentication in the network environment, where connection information is captured and stored. This facilitates administrator access to information created as a result of protocol exchanges involved in dynamic address assignment, authentication, and connection.
    Type: Application
    Filed: August 9, 2005
    Publication date: February 15, 2007
    Inventors: Jeffrey Bardsley, Nathaniel Kim, Charles Lingafelt, Allen Roginsky, Norman Strole
  • Publication number: 20050198520
    Abstract: A threat management domain controller is responsive to a computer-actionable threat management vector that includes a first computer-readable field that provides identification of at least one system type that is affected by a computer security threat, a second computer-readable field that provides identification of a release level for the system type and a third computer-readable field that provides identification of a set of possible countermeasures for a system type and release level. The threat management domain controller processes a threat management vector that is received for use by a domain of target computer systems, and transmits the threat management vector that has been processed to at least one of the target computer systems in the domain of target computer systems.
    Type: Application
    Filed: March 2, 2004
    Publication date: September 8, 2005
    Inventors: Jeffrey Bardsley, Ashley Brock, Charles Davis, Nathaniel Kim, John McKenna, Carlos Villegas
  • Publication number: 20050039046
    Abstract: A countermeasure for a computer security threat to a computer system is administered by establishing a baseline identification of an operating or application system type and an operating or application system release level for the computer system that is compatible with a Threat Management Vector (TMV). A TMV is then received, including therein a first field that provides identification of at least one operating system type that is affected by a computer security threat, a second field that provides identification of an operating system release level for the operating system type, and a third field that provides identification of a set of possible countermeasures for an operating system type and an operating system release level. Countermeasures that are identified in the TMV are processed if the TMV identifies the operating system type and operating system release level for the computer system as being affected by the computer security threat.
    Type: Application
    Filed: July 22, 2003
    Publication date: February 17, 2005
    Inventors: Jeffrey Bardsley, Ashley Brock, Charles Davis, Nathaniel Kim, John McKenna, Carlos Villegas
  • Publication number: 20050022021
    Abstract: Computer security threat management information is generated upon receiving notification of a computer security threat, by generating a computer-actionable Threat Management Vector (TMV) from the notification that was received. The TMV includes a first computer-readable field that provides identification of at least one system type that is affected by the security threat, a second computer-readable field that provides identification of a release level for the system type, and a third computer-readable field that provides identification of a set of possible countermeasures for a system type and a release level. The TMV that is generated is transmitted to target systems for processing.
    Type: Application
    Filed: July 22, 2003
    Publication date: January 27, 2005
    Inventors: Jeffrey Bardsley, Ashley Brock, Charles Davis, Nathaniel Kim, John McKenna, Carlos Villegas