Patents by Inventor Nicholas Witchey
Nicholas Witchey has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240126856Abstract: Authentication tokens, systems, and methods are described. An illustrative method is disclosed to include receiving an electronic file including a digital image, receiving biometric information that is associated with a person, modifying the electronic file with the biometric information such that one or more pixels in the digital image are replaced with the biometric information, and storing the modified electronic file as a digital authentication token to be used in connection with authorized publications of original digital work.Type: ApplicationFiled: December 26, 2023Publication date: April 18, 2024Inventors: Luna Witchey, John Zachary Sanborn, Patrick Soon-Shiong, Nicholas James Witchey
-
Patent number: 11894109Abstract: Systems and methods for tracking biological samples are presented. In some embodiments, intrinsic and extrinsic biological sample data and/or intrinsic and extrinsic patient data are used to label a biological sample obtained at a point-of-care facility. The labeled biological sample may be sent to a processing facility, wherein the labeled biological sample undergoes analysis and/or processing into a labeled therapeutic. The labeled therapeutic is delivered back to the point-of-care facility, wherein the labeled therapeutic is tested for the presence of the additives prior to administration to a patient. Multi-factor validation is performed, including validating the identity of the patient to a container, validating the identity of the labeled biological sample/therapeutic to the container, and thus, validating the identity of the labeled therapeutic to the patient.Type: GrantFiled: September 5, 2019Date of Patent: February 6, 2024Assignee: NantCell, Inc.Inventors: Kayvan Niazi, Nicholas Witchey
-
Patent number: 10356049Abstract: Based on a hidden service address table stored in a memory, a virtual circuit related to a hidden service is mapped to a corresponding port-level channel based on the hidden service's address. Data associated with the hidden service is routed between the virtual circuit and the port-level channel. This enables binding of high level anonymity protocols to low level communication services of a network fabric and ensures that other nodes in the network fabric can leverage fabric-hosted hidden services without requiring updates to an existing anonymity protocol.Type: GrantFiled: May 14, 2018Date of Patent: July 16, 2019Assignee: Nant Holdings IP, LLCInventors: Thomas Wittenschlaeger, Nicholas Witchey
-
Publication number: 20180351916Abstract: Based on a hidden service address table stored in a memory, a virtual circuit related to a hidden service is mapped to a corresponding port-level channel based on the hidden service's address. Data associated with the hidden service is routed between the virtual circuit and the port-level channel. This enables binding of high level anonymity protocols to low level communication services of a network fabric and ensures that other nodes in the network fabric can leverage fabric-hosted hidden services without requiring updates to an existing anonymity protocol.Type: ApplicationFiled: May 14, 2018Publication date: December 6, 2018Inventors: Thomas Wittenschlaeger, Nicholas Witchey
-
Patent number: 8678924Abstract: Systems, apparatus, and methods relating to a physical object that are associated with a virtual game world are described. Some embodiments of the physical object have an in-game value within the virtual game world. Software operating the virtual game world ascribes purchasing power or attributes having offensive, defensive, opportunity, or set values as their in-game values. Methods associated with the subject matter relate to relocating an asset of the game component from one asset storage area to another asset storage area. When relocated, an asset's authenticity is validated, retrieved from a first storage area, exchanged over a communications interface, or stored in a second asset storage area.Type: GrantFiled: May 29, 2012Date of Patent: March 25, 2014Inventor: Nicholas Witchey
-
Publication number: 20120226650Abstract: An innovation expert system is presented. The expert system can include one or more reasoning engines capable of generating a hypothesis representing a possible path for innovation between a concept and a technological class. The hypothesis can be validated to some extent by analysis or simulation.Type: ApplicationFiled: March 5, 2012Publication date: September 6, 2012Inventor: Nicholas Witchey
-
Patent number: 7649880Abstract: Systems and methods for quickly resolving storage area commands from packet addresses are presented. Clients exchange packets comprising addresses and payloads with physical storage areas that have controllers using a stateless protocol. Modules use the addresses in addition to payloads to derive commands that are understandable by the controller. Furthermore, the neither the module nor the controller require use of a file system to interact with the physical storage area. Modules can derive the storage area commands through resolving a context associated with physical storage area. In some embodiments, modules split addresses into portions that can be used as indices into context lookup tables. In other embodiments, modules can employ variants to router address lookup algorithms to quickly resolve storage area commands.Type: GrantFiled: December 16, 2005Date of Patent: January 19, 2010Inventors: Mark Adams, Nicholas Witchey, Thomas Ludwig
-
Publication number: 20070260448Abstract: Usages of language are analyzed in ways that are at least partially language independent. In preferred embodiments, portions of a document are hashed, and the resulting hash values are compared with each other and with those of other documents in real-time. Analyses can be used to gauge conformity of a document to one or more standards, to provide suggestions to the author, and to filter email.Type: ApplicationFiled: May 7, 2007Publication date: November 8, 2007Inventors: David Lorenzen, Nicholas Witchey
-
Publication number: 20070237157Abstract: Systems and methods ensure that datagrams retain integrity in light of the problems associated with the internetworking protocol's use of datagram identifiers drawn from a first pool of datagram identifiers. The methods involve controlling the use of datagram identifiers to ensure that only certain identifiers are allowable. A second pool of datagram identifiers is created that is different from the first pool. A datagram identifier is drawn from the second pool and assigned to a datagram in a manner that the datagram identifier is controlled from being reused during the lifetime of the datagram. In alternative embodiments the number of available datagram identifiers is either increased through optional header fields, or reduced through tracking allowed datagram identifiers. A first host notifies a second host of an allowed identifier. The second host uses the allowed identifier as a datagram identifier.Type: ApplicationFiled: May 15, 2006Publication date: October 11, 2007Inventors: Charles Frank, Thomas Ludwig, Richard Hull, Mark Adams, Rochak Sharma, Adnan Khan, Samuel Baughman, Nicholas Witchey
-
Publication number: 20070168396Abstract: Systems and methods for generating storage system commands are presented. Logical volumes comprise one or more storage areas. The methods include providing a map of the logical volume from information relating to the types of the storage areas composing the volume. Storage commands referencing the logical volume map are converted to storage area commands by command handlers associated with the type of the storage areas in the logical volume. The storage system comprises clients that access the storage areas by using a command stacks associated with the logical volumes.Type: ApplicationFiled: June 20, 2006Publication date: July 19, 2007Inventors: Mark Adams, Thomas Ludwig, Samuel Baughman, Nicholas Witchey, Nauzad Sadry
-
Publication number: 20070083662Abstract: Resource command messages comprise commands and command urgency or importance information that is interpreted by a resource device and is coupled with information relating to the resource device to determine when to process the command within the resource command message. Resource devices comprising a plurality of resource nodes provide increased performance, responsiveness, and load balancing by multiple resource nodes processing the same resource command message in parallel.Type: ApplicationFiled: October 6, 2005Publication date: April 12, 2007Inventors: Mark Adams, Thomas Ludwig, Charles Frank, Nicholas Witchey
-
Publication number: 20060272015Abstract: Modules and methods that provide virtual device communication via information packets addressed to the virtual devices. Virtual devices aggregate capabilities of target devices and represent the aggregate as an operational device to remote systems. Physical device elements and virtual devices contained within modules are able to communicate and cooperate over extended distances in a peer-to-peer fashion via a virtual bus tunnel offering addressing and data transport functionality. Such modules and methods can be combined with disk drives to form RAID-like storage structures.Type: ApplicationFiled: May 26, 2005Publication date: November 30, 2006Inventors: Charles Frank, Thomas Ludwig, William Babbitt, Mark Adams, Nicholas Witchey
-
Publication number: 20060198208Abstract: An add-on module provides publicasting functionality to legacy and other devices. Contemplated modules include: (a) a transformation agent that transforms device data to a desired publishable data format for insertion into a remote application, and (b) a consumer interface that publicasts the device data as publishable data to a remote device data consumer. Implementations are contemplated for both legacy devices that lack complete publicasting capability, and newly developed devices for which the developer desires a ready-made implementation of publicasting functionality.Type: ApplicationFiled: March 7, 2005Publication date: September 7, 2006Inventors: Nicholas Witchey, Curtis Brown
-
Publication number: 20060156054Abstract: An add-on module provides extrinsic management functionality to legacy and other devices. Contemplated modules include: (a) a state agent that provides at least one of the MILARRS function, and (b) a product agent that communicates with the device using at least one serial interface. Implementations are contemplated for both legacy devices that natively provide less than complete MILARRS functionality, and newly developed devices for which the developer desires a ready-made implementation of MILARRS functionality.Type: ApplicationFiled: January 7, 2005Publication date: July 13, 2006Inventors: Curtis Brown, Nicholas Witchey
-
Publication number: 20060101130Abstract: Systems and methods for quickly resolving storage area commands from packet addresses are presented. Clients exchange packets comprising addresses and payloads with physical storage areas that have controllers using a stateless protocol. Modules use the addresses in addition to payloads to derive commands that are understandable by the controller. Furthermore, the neither the module nor the controller require use of a file system to interact with the physical storage area. Modules can derive the storage area commands through resolving a context associated with physical storage area. In some embodiments, modules split addresses into portions that can be used as indices into context lookup tables. In other embodiments, modules can employ variants to router address lookup algorithms to quickly resolve storage area commands.Type: ApplicationFiled: December 16, 2005Publication date: May 11, 2006Inventors: Mark Adams, Nicholas Witchey, Thomas Ludwig
-
Publication number: 20050108434Abstract: A method and embedded system for connecting a legacy device to a network are provided. The system includes a firewall module that can be configured by embedded system firmware to filter data packets when data packets do not match pre-determined rules; determines if data is intended for an allowed port; and discards data if data is not for an allowed port or an allowed address. If address and data port are allowed, then data is transmitted to the network. The method includes, determining if a data packet is from an allowed address, wherein an embedded system coupled to the legacy device uses a firewall module to filter data packets when data packets do not match pre-determined rules; determining if data is intended for an allowed port; and discarding data if data is not for an allowed port or an allowed address.Type: ApplicationFiled: August 3, 2004Publication date: May 19, 2005Inventor: Nicholas Witchey
-
Publication number: 20050106941Abstract: The present invention generally relates to a communication protocol converter to allow a legacy device utilizing IPv4 to operate across the network using IPv6. In a first embodiment of the invention, two modular Ethernet connectors are placed side-by-side. A first modular connector receives IPv4 Ethernet data which is converted to a raw data signal. The data is transmitted from the first modular connector to a second modular connector by a bidirectional data line. The second connector receives the raw data, and a raw data-to-Ethernet conversion is completed providing output at IPv6. The present invention utilizes the form factor structure of the Ethernet connectors, so that the entire electronic circuitry is contained within the connectors to complete the conversion. An alternate embodiment incorporates the connectors into a single housing and the conversion is completed internally by a microprocessor and embedded software. A method of IPv4 to IPv6 conversion is additionally disclosed.Type: ApplicationFiled: November 13, 2003Publication date: May 19, 2005Inventor: Nicholas Witchey
-
Publication number: 20050108524Abstract: A method and device for securing data transmission via an embedded system that is operationally coupled to a local device and a remote computing system using a network is provided. The method includes, determining if data received from the remote computing system is secured, handshaking with the remote computing system if the data received is from a new connection; decrypting the secured data; and transmitting the decrypted data to the local device. The method also includes, determining if the data received from the local device is from a new connection, handshaking with the remote computing system if the data received is from a new connection; encrypting the data; and transmitting the encrypted data to the remote computing system. A receiving module determines whether input data needs to be encrypted or decrypted; a processing module for encrypting and/or decrypting input data; and an output module for transmitting encrypted and/decrypted data.Type: ApplicationFiled: July 21, 2004Publication date: May 19, 2005Inventor: Nicholas Witchey