Patents by Inventor Nicholas Witchey

Nicholas Witchey has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240126856
    Abstract: Authentication tokens, systems, and methods are described. An illustrative method is disclosed to include receiving an electronic file including a digital image, receiving biometric information that is associated with a person, modifying the electronic file with the biometric information such that one or more pixels in the digital image are replaced with the biometric information, and storing the modified electronic file as a digital authentication token to be used in connection with authorized publications of original digital work.
    Type: Application
    Filed: December 26, 2023
    Publication date: April 18, 2024
    Inventors: Luna Witchey, John Zachary Sanborn, Patrick Soon-Shiong, Nicholas James Witchey
  • Patent number: 11894109
    Abstract: Systems and methods for tracking biological samples are presented. In some embodiments, intrinsic and extrinsic biological sample data and/or intrinsic and extrinsic patient data are used to label a biological sample obtained at a point-of-care facility. The labeled biological sample may be sent to a processing facility, wherein the labeled biological sample undergoes analysis and/or processing into a labeled therapeutic. The labeled therapeutic is delivered back to the point-of-care facility, wherein the labeled therapeutic is tested for the presence of the additives prior to administration to a patient. Multi-factor validation is performed, including validating the identity of the patient to a container, validating the identity of the labeled biological sample/therapeutic to the container, and thus, validating the identity of the labeled therapeutic to the patient.
    Type: Grant
    Filed: September 5, 2019
    Date of Patent: February 6, 2024
    Assignee: NantCell, Inc.
    Inventors: Kayvan Niazi, Nicholas Witchey
  • Patent number: 10356049
    Abstract: Based on a hidden service address table stored in a memory, a virtual circuit related to a hidden service is mapped to a corresponding port-level channel based on the hidden service's address. Data associated with the hidden service is routed between the virtual circuit and the port-level channel. This enables binding of high level anonymity protocols to low level communication services of a network fabric and ensures that other nodes in the network fabric can leverage fabric-hosted hidden services without requiring updates to an existing anonymity protocol.
    Type: Grant
    Filed: May 14, 2018
    Date of Patent: July 16, 2019
    Assignee: Nant Holdings IP, LLC
    Inventors: Thomas Wittenschlaeger, Nicholas Witchey
  • Publication number: 20180351916
    Abstract: Based on a hidden service address table stored in a memory, a virtual circuit related to a hidden service is mapped to a corresponding port-level channel based on the hidden service's address. Data associated with the hidden service is routed between the virtual circuit and the port-level channel. This enables binding of high level anonymity protocols to low level communication services of a network fabric and ensures that other nodes in the network fabric can leverage fabric-hosted hidden services without requiring updates to an existing anonymity protocol.
    Type: Application
    Filed: May 14, 2018
    Publication date: December 6, 2018
    Inventors: Thomas Wittenschlaeger, Nicholas Witchey
  • Patent number: 8678924
    Abstract: Systems, apparatus, and methods relating to a physical object that are associated with a virtual game world are described. Some embodiments of the physical object have an in-game value within the virtual game world. Software operating the virtual game world ascribes purchasing power or attributes having offensive, defensive, opportunity, or set values as their in-game values. Methods associated with the subject matter relate to relocating an asset of the game component from one asset storage area to another asset storage area. When relocated, an asset's authenticity is validated, retrieved from a first storage area, exchanged over a communications interface, or stored in a second asset storage area.
    Type: Grant
    Filed: May 29, 2012
    Date of Patent: March 25, 2014
    Inventor: Nicholas Witchey
  • Publication number: 20120226650
    Abstract: An innovation expert system is presented. The expert system can include one or more reasoning engines capable of generating a hypothesis representing a possible path for innovation between a concept and a technological class. The hypothesis can be validated to some extent by analysis or simulation.
    Type: Application
    Filed: March 5, 2012
    Publication date: September 6, 2012
    Inventor: Nicholas Witchey
  • Patent number: 7649880
    Abstract: Systems and methods for quickly resolving storage area commands from packet addresses are presented. Clients exchange packets comprising addresses and payloads with physical storage areas that have controllers using a stateless protocol. Modules use the addresses in addition to payloads to derive commands that are understandable by the controller. Furthermore, the neither the module nor the controller require use of a file system to interact with the physical storage area. Modules can derive the storage area commands through resolving a context associated with physical storage area. In some embodiments, modules split addresses into portions that can be used as indices into context lookup tables. In other embodiments, modules can employ variants to router address lookup algorithms to quickly resolve storage area commands.
    Type: Grant
    Filed: December 16, 2005
    Date of Patent: January 19, 2010
    Inventors: Mark Adams, Nicholas Witchey, Thomas Ludwig
  • Publication number: 20070260448
    Abstract: Usages of language are analyzed in ways that are at least partially language independent. In preferred embodiments, portions of a document are hashed, and the resulting hash values are compared with each other and with those of other documents in real-time. Analyses can be used to gauge conformity of a document to one or more standards, to provide suggestions to the author, and to filter email.
    Type: Application
    Filed: May 7, 2007
    Publication date: November 8, 2007
    Inventors: David Lorenzen, Nicholas Witchey
  • Publication number: 20070237157
    Abstract: Systems and methods ensure that datagrams retain integrity in light of the problems associated with the internetworking protocol's use of datagram identifiers drawn from a first pool of datagram identifiers. The methods involve controlling the use of datagram identifiers to ensure that only certain identifiers are allowable. A second pool of datagram identifiers is created that is different from the first pool. A datagram identifier is drawn from the second pool and assigned to a datagram in a manner that the datagram identifier is controlled from being reused during the lifetime of the datagram. In alternative embodiments the number of available datagram identifiers is either increased through optional header fields, or reduced through tracking allowed datagram identifiers. A first host notifies a second host of an allowed identifier. The second host uses the allowed identifier as a datagram identifier.
    Type: Application
    Filed: May 15, 2006
    Publication date: October 11, 2007
    Inventors: Charles Frank, Thomas Ludwig, Richard Hull, Mark Adams, Rochak Sharma, Adnan Khan, Samuel Baughman, Nicholas Witchey
  • Publication number: 20070168396
    Abstract: Systems and methods for generating storage system commands are presented. Logical volumes comprise one or more storage areas. The methods include providing a map of the logical volume from information relating to the types of the storage areas composing the volume. Storage commands referencing the logical volume map are converted to storage area commands by command handlers associated with the type of the storage areas in the logical volume. The storage system comprises clients that access the storage areas by using a command stacks associated with the logical volumes.
    Type: Application
    Filed: June 20, 2006
    Publication date: July 19, 2007
    Inventors: Mark Adams, Thomas Ludwig, Samuel Baughman, Nicholas Witchey, Nauzad Sadry
  • Publication number: 20070083662
    Abstract: Resource command messages comprise commands and command urgency or importance information that is interpreted by a resource device and is coupled with information relating to the resource device to determine when to process the command within the resource command message. Resource devices comprising a plurality of resource nodes provide increased performance, responsiveness, and load balancing by multiple resource nodes processing the same resource command message in parallel.
    Type: Application
    Filed: October 6, 2005
    Publication date: April 12, 2007
    Inventors: Mark Adams, Thomas Ludwig, Charles Frank, Nicholas Witchey
  • Publication number: 20060272015
    Abstract: Modules and methods that provide virtual device communication via information packets addressed to the virtual devices. Virtual devices aggregate capabilities of target devices and represent the aggregate as an operational device to remote systems. Physical device elements and virtual devices contained within modules are able to communicate and cooperate over extended distances in a peer-to-peer fashion via a virtual bus tunnel offering addressing and data transport functionality. Such modules and methods can be combined with disk drives to form RAID-like storage structures.
    Type: Application
    Filed: May 26, 2005
    Publication date: November 30, 2006
    Inventors: Charles Frank, Thomas Ludwig, William Babbitt, Mark Adams, Nicholas Witchey
  • Publication number: 20060198208
    Abstract: An add-on module provides publicasting functionality to legacy and other devices. Contemplated modules include: (a) a transformation agent that transforms device data to a desired publishable data format for insertion into a remote application, and (b) a consumer interface that publicasts the device data as publishable data to a remote device data consumer. Implementations are contemplated for both legacy devices that lack complete publicasting capability, and newly developed devices for which the developer desires a ready-made implementation of publicasting functionality.
    Type: Application
    Filed: March 7, 2005
    Publication date: September 7, 2006
    Inventors: Nicholas Witchey, Curtis Brown
  • Publication number: 20060156054
    Abstract: An add-on module provides extrinsic management functionality to legacy and other devices. Contemplated modules include: (a) a state agent that provides at least one of the MILARRS function, and (b) a product agent that communicates with the device using at least one serial interface. Implementations are contemplated for both legacy devices that natively provide less than complete MILARRS functionality, and newly developed devices for which the developer desires a ready-made implementation of MILARRS functionality.
    Type: Application
    Filed: January 7, 2005
    Publication date: July 13, 2006
    Inventors: Curtis Brown, Nicholas Witchey
  • Publication number: 20060101130
    Abstract: Systems and methods for quickly resolving storage area commands from packet addresses are presented. Clients exchange packets comprising addresses and payloads with physical storage areas that have controllers using a stateless protocol. Modules use the addresses in addition to payloads to derive commands that are understandable by the controller. Furthermore, the neither the module nor the controller require use of a file system to interact with the physical storage area. Modules can derive the storage area commands through resolving a context associated with physical storage area. In some embodiments, modules split addresses into portions that can be used as indices into context lookup tables. In other embodiments, modules can employ variants to router address lookup algorithms to quickly resolve storage area commands.
    Type: Application
    Filed: December 16, 2005
    Publication date: May 11, 2006
    Inventors: Mark Adams, Nicholas Witchey, Thomas Ludwig
  • Publication number: 20050108434
    Abstract: A method and embedded system for connecting a legacy device to a network are provided. The system includes a firewall module that can be configured by embedded system firmware to filter data packets when data packets do not match pre-determined rules; determines if data is intended for an allowed port; and discards data if data is not for an allowed port or an allowed address. If address and data port are allowed, then data is transmitted to the network. The method includes, determining if a data packet is from an allowed address, wherein an embedded system coupled to the legacy device uses a firewall module to filter data packets when data packets do not match pre-determined rules; determining if data is intended for an allowed port; and discarding data if data is not for an allowed port or an allowed address.
    Type: Application
    Filed: August 3, 2004
    Publication date: May 19, 2005
    Inventor: Nicholas Witchey
  • Publication number: 20050106941
    Abstract: The present invention generally relates to a communication protocol converter to allow a legacy device utilizing IPv4 to operate across the network using IPv6. In a first embodiment of the invention, two modular Ethernet connectors are placed side-by-side. A first modular connector receives IPv4 Ethernet data which is converted to a raw data signal. The data is transmitted from the first modular connector to a second modular connector by a bidirectional data line. The second connector receives the raw data, and a raw data-to-Ethernet conversion is completed providing output at IPv6. The present invention utilizes the form factor structure of the Ethernet connectors, so that the entire electronic circuitry is contained within the connectors to complete the conversion. An alternate embodiment incorporates the connectors into a single housing and the conversion is completed internally by a microprocessor and embedded software. A method of IPv4 to IPv6 conversion is additionally disclosed.
    Type: Application
    Filed: November 13, 2003
    Publication date: May 19, 2005
    Inventor: Nicholas Witchey
  • Publication number: 20050108524
    Abstract: A method and device for securing data transmission via an embedded system that is operationally coupled to a local device and a remote computing system using a network is provided. The method includes, determining if data received from the remote computing system is secured, handshaking with the remote computing system if the data received is from a new connection; decrypting the secured data; and transmitting the decrypted data to the local device. The method also includes, determining if the data received from the local device is from a new connection, handshaking with the remote computing system if the data received is from a new connection; encrypting the data; and transmitting the encrypted data to the remote computing system. A receiving module determines whether input data needs to be encrypted or decrypted; a processing module for encrypting and/or decrypting input data; and an output module for transmitting encrypted and/decrypted data.
    Type: Application
    Filed: July 21, 2004
    Publication date: May 19, 2005
    Inventor: Nicholas Witchey