Patents by Inventor Paul A. Ashley

Paul A. Ashley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10785026
    Abstract: A method and/or NFC (Near Field Communication) enabled mobile device is provided for executing an electronic contract on NFC enabled mobile devices. The (NFC) enabled mobile device applies an electronic signature thereof in an electronic contract provided on the NFC enabled mobile device used by a first contracting party, where the electronic signature is applied through a secure element of the NFC enabled mobile device. The NFC enabled mobile device determines that the NFC enabled mobile device is not within NFC range to an other NFC enabled mobile device used by a second contracting party to the electronic contract. In response to the NFC enabled mobile device determining that it is not within NFC range to the other NFC enabled mobile device, the NFC enabled mobile device sends, to the other NFC enabled mobile device, a multimedia messaging service (MMS) text message that includes the electronic contract.
    Type: Grant
    Filed: April 12, 2018
    Date of Patent: September 22, 2020
    Assignee: International Business Machines Corporation
    Inventors: Paul A. Ashley, Anthony M. Butler, Ravi Kothari, Yu-Chen Lin
  • Patent number: 10619856
    Abstract: A gas turbine engine includes a combustion system. The combustion system may include a combustor positioned in a chamber created by an outer wall. A compressor, such as a centrifugal compressor may provide a flow of compressed air into the chamber along an inner surface of the outer wall since an inlet for the flow of compressed air is outboard of the combustor. The pressurized flow of air may be redirected by a cowl included in the chamber. The cowl may include a collar defining a notch in the cowl. The collar may redirect the flow of pressurized air so as to minimize a high velocity component of the flow of pressurized air flowing radially toward a central axis of the engine prior to entering a head of a fuel nozzle included in the combustion system.
    Type: Grant
    Filed: November 10, 2017
    Date of Patent: April 14, 2020
    Assignee: Rolls-Royce Corporation
    Inventors: Keith Alan McCormick, Paul Ashley Denman
  • Patent number: 10511493
    Abstract: An apparatus has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to store identity attributes including real identity attributes for a real individual and at least two sets of digital identity attributes each operative as a personal privacy proxy with compartmental identity attributes. The at least two sets of digital identity attributes include a first machine generated digital identity email address associated with a first role and a second machine generated digital identity email address associated with a second role.
    Type: Grant
    Filed: February 15, 2018
    Date of Patent: December 17, 2019
    Assignee: ANONYOME LABS, INC.
    Inventors: Steven Harvey McCown, Paul Ashley, Steve Shillingford, Greg Clark
  • Patent number: 10382211
    Abstract: A machine has a processor and a network interface circuit connected to the processor to provide network connectivity to a client device. A memory is connected to the processor. The memory stores instructions executed by the processor to implement a persona management service that operates to receive a request for a new email account from the client device. A new email account is created in response to the request. Cryptographic credentials for the new email account are received from the client device. The cryptographic credentials are sent to a certificate authority. A certificate authority validation is received from the certificate authority. The new email account with a cryptographic credential from the certificate authority is registered. The cryptographic credential is conveyed to the client device.
    Type: Grant
    Filed: January 13, 2017
    Date of Patent: August 13, 2019
    Assignee: Anonyome Labs, Inc.
    Inventors: Paul Ashley, Steve Shillingford, Simon Gee, John David Mumford, Greg Clark
  • Patent number: 10356052
    Abstract: A non-transitory computer readable storage medium has instructions executed by a processor to host a proxy identity depot service application program interface to provide communication channels for proxy identity enabled applications operative on client devices. A proxy identity depot has a proxy identity management service, a proxy identity reputation service and a proxy identity transfer service. The proxy identity depot includes proxy identities for a real user, where each proxy identity has its own identity attributes to protect primary identity attributes of the real user and thereby each proxy identity is operative as a personal privacy proxy.
    Type: Grant
    Filed: September 15, 2017
    Date of Patent: July 16, 2019
    Assignee: Anonyome Labs, Inc.
    Inventors: Paul Ashley, Steve Shillingford, John David Mumford, Simon Gee, Greg Clark
  • Patent number: 10320753
    Abstract: A machine has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to allow a user to designate a selected persona from a pool of potential personas, where each potential persona is associated with the user and has a distinct set of computer network attributes. A virtual private network egress point for the selected persona is designated, where the virtual private network egress point masks computer network attributes of the selected persona. Contact with the virtual private network egress point is coordinated to initiate a network communication for the selected persona.
    Type: Grant
    Filed: January 19, 2016
    Date of Patent: June 11, 2019
    Assignee: Anonyome Labs, Inc.
    Inventors: Paul Ashley, Steve Shillingford, Simon Gee, Glen Leeder, Greg Clark
  • Publication number: 20190156944
    Abstract: A device receives historical information associated with an individual to be monitored, wherein the historical information includes at least one of information associated with a health history of the individual, health histories of other individuals, activities of the individual, or activities of the other individuals. The device receives monitored information associated with the individual from one or more client devices associated with the individual, and pre-processes the monitored information to generate pre-processed monitored information that is understood by the trained machine learning model. The device processes the pre-processed monitored information, with a trained machine learning model, to identify one or more activities of the individual and one or more deviations from the one or more activities by the individual, and performs one or more actions based on the one or more activities of the individual and/or the one or more deviations from the one or more activities.
    Type: Application
    Filed: November 14, 2018
    Publication date: May 23, 2019
    Inventors: Laetitia Cailleteau ERIKSSON, Kar Lok CHAN, Faisal Ahmed VALLI, Christopher Paul ASHLEY
  • Patent number: 10178106
    Abstract: A non-transitory computer readable storage medium has instructions executed by a processor to collect mobile device environment parameters. Identity attributes including real identity attributes for a real individual and at least one set of synthetic identity attributes are stored. An electronic communication attempt by a designated entity corresponding to either the real identity attributes or the at least one set of synthetic identity attributes is monitored. The electronic communication attempt is analyzed in connection with the mobile device environment parameters and identity attributes to identify a rule transgression. A warning is supplied in connection with the electronic communication attempt in response to the rule transgression.
    Type: Grant
    Filed: May 14, 2015
    Date of Patent: January 8, 2019
    Assignee: Anonyome Labs, Inc.
    Inventors: Paul Ashley, Steve Shillingford, Neil Readshaw, Simon Gee, Greg Clark, Phong Le
  • Publication number: 20180259186
    Abstract: A gas turbine engine includes a combustion system. The combustion system may include a combustor positioned in a chamber created by an outer wall. A compressor, such as a centrifugal compressor may provide a flow of compressed air into the chamber along an inner surface of the outer wall since an inlet for the flow of compressed air is outboard of the combustor. The pressurized flow of air may be redirected by a cowl included in the chamber. The cowl may include a collar defining a notch in the cowl. The collar may redirect the flow of pressurized air so as to minimize a high velocity component of the flow of pressurized air flowing radially toward a central axis of the engine prior to entering a head of a fuel nozzle included in the combustion system.
    Type: Application
    Filed: November 10, 2017
    Publication date: September 13, 2018
    Applicant: Rolls-Royce Corporation
    Inventors: Keith Alan McCormick, Paul Ashley Denman
  • Publication number: 20180234240
    Abstract: A method and/or NFC (Near Field Communication) enabled mobile device is provided for executing an electronic contract on NFC enabled mobile devices. The (NFC) enabled mobile device applies an electronic signature thereof in an electronic contract provided on the NFC enabled mobile device used by a first contracting party, where the electronic signature is applied through a secure element of the NFC enabled mobile device. The NFC enabled mobile device determines that the NFC enabled mobile device is not within NFC range to an other NFC enabled mobile device used by a second contracting party to the electronic contract. In response to the NFC enabled mobile device determining that it is not within NFC range to the other NFC enabled mobile device, the NFC enabled mobile device sends, to the other NFC enabled mobile device, a multimedia messaging service (MMS) text message that includes the electronic contract.
    Type: Application
    Filed: April 12, 2018
    Publication date: August 16, 2018
    Inventors: PAUL A. ASHLEY, ANTHONY M. BUTLER, RAVI KOTHARI, YU-CHEN LIN
  • Patent number: 10032240
    Abstract: A method, system and/or NFC (Near field communication) enabled mobile device is provided for executing an electronic contract on NFC enabled mobile devices. A first contracting party is provided to apply an electronic signature thereof in an electronic contract provided on a first NFC enabled mobile device used by the first contracting party, the electronic signature is applied through a secure element of the first NFC enabled mobile device. The electronically signed contract is transmitted from the first NFC enabled mobile device to a second NFC enabled mobile device used by a second contracting party for providing the second contracting party to apply an electronic signature thereof in the received electronically signed contract from the first NFC enabled mobile device through a secure element in the second NFC enabled mobile device.
    Type: Grant
    Filed: November 8, 2013
    Date of Patent: July 24, 2018
    Assignee: International Business Machines Corporation
    Inventors: Paul A. Ashley, Anthony M. Butler, Ravi Kothari, Yu-Chen Lin
  • Patent number: 10033530
    Abstract: A method, system and/or NFC (Near field communication) enabled mobile device is provided for executing an electronic contract on NFC enabled mobile devices. A first contracting party is provided to apply an electronic signature thereof in an electronic contract provided on a first NFC enabled mobile device used by the first contracting party, the electronic signature is applied through a secure element of the first NFC enabled mobile device. The electronically signed contract is transmitted from the first NFC enabled mobile device to a second NFC enabled mobile device used by a second contracting party for providing the second contracting party to apply an electronic signature thereof in the received electronically signed contract from the first NFC enabled mobile device through a secure element in the second NFC enabled mobile device.
    Type: Grant
    Filed: March 7, 2014
    Date of Patent: July 24, 2018
    Assignee: International Business Machines Corporation
    Inventors: Paul A. Ashley, Anthony M. Butler, Ravi Kothari, Yu-Chen Lin
  • Patent number: 9906371
    Abstract: One or more computer processors identify a first certificate that is used to establish a secure Internet connection. One or more computer processors identify a stored second certificate that shares at least one attribute with the first certificate. One or more computer processors determine a policy action based, at least in part, on a result of a comparison between an attribute of the first certificate and an attribute of the second certificate.
    Type: Grant
    Filed: February 18, 2016
    Date of Patent: February 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Paul A. Ashley, Carsten Hagemann
  • Patent number: 9729519
    Abstract: A machine has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to receive an email account request, a name and a public key. A selected domain name is designated from a group of available domain names. A user name is generated based upon the name. An email account is formed using the user name and the selected domain name. The public key is stored.
    Type: Grant
    Filed: December 22, 2014
    Date of Patent: August 8, 2017
    Assignee: Anonyome Labs, Inc.
    Inventors: Paul Ashley, Steve Shillingford, Greg Clark, Simon Gee, Tim Bartley
  • Patent number: 9729642
    Abstract: A technique to at least partial transfer an active network communication session associated with a server and an authenticated user communicating through a first device. The at least partial transfer includes the following actions (not necessarily in the following order): (i) recording the network communication session on an inline network device; (ii) associating the network communication session with the second device on the inline network device; and (iii) sending session continuation information from the inline network device to at least the second device and/or the server. The first device is in data communication with the inline network device during at least a portion of the recording step. The session continuation information sent at the sending step includes information enabling the user to continue the active network communication session through the second device.
    Type: Grant
    Filed: May 24, 2013
    Date of Patent: August 8, 2017
    Assignee: International Business Machines Corporation
    Inventors: Paul A. Ashley, Christopher Y. Choi, John W. Court, Simon W. Gee
  • Patent number: 9703986
    Abstract: A machine has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to collect synthetic identity activity information characterizing computer network activity associated with a synthetic identity. A synthetic identity reputation score is computed based upon a current synthetic identity reputation score, a synthetic identity activity value and an activity provider weighting.
    Type: Grant
    Filed: August 13, 2015
    Date of Patent: July 11, 2017
    Assignee: Anonyome Labs, Inc.
    Inventors: Paul Ashley, Steve Shillingford, Greg Clark, Dennis Wilkins, Mike Neuenschwander, Stephen Sartor
  • Publication number: 20170155681
    Abstract: A method, system and computer-usable medium are disclosed for automatically deploying a network security policy based on virtual network topology in a dynamic software defined network (SDN) comprising: providing a flow control interface in a dynamic SDN wherein the flow control interface receives virtual network topology, operational endpoints, and policy to apply to the operational endpoints; responsive to receiving an SDN change indication, identifying changes to enforcement points for an SDN change corresponding to the SDN change indication; and, providing enforcement points affected by the SDN change with a policy reflecting the SDN change.
    Type: Application
    Filed: November 30, 2015
    Publication date: June 1, 2017
    Inventors: Paul A. Ashley, Cheng-Ta Lee, Ronald B. Williams
  • Patent number: 9654513
    Abstract: A method, system and computer-usable medium are disclosed for automatically deploying a network security policy based on virtual network topology in a dynamic software defined network (SDN) comprising: providing a flow control interface in a dynamic SDN wherein the flow control interface receives virtual network topology, operational endpoints, and policy to apply to the operational endpoints; responsive to receiving an SDN change indication, identifying changes to enforcement points for an SDN change corresponding to the SDN change indication; and, providing enforcement points affected by the SDN change with a policy reflecting the SDN change.
    Type: Grant
    Filed: November 30, 2015
    Date of Patent: May 16, 2017
    Assignee: International Business Machines Corporation
    Inventors: Paul A. Ashley, Cheng-Ta Lee, Ronald B. Williams
  • Patent number: 9602291
    Abstract: One or more computer processors identify a first certificate that is used to establish a secure Internet connection. One or more computer processors identify a stored second certificate that shares at least one attribute with the first certificate. One or more computer processors determine a policy action based, at least in part, on a result of a comparison between an attribute of the first certificate and an attribute of the second certificate.
    Type: Grant
    Filed: June 2, 2015
    Date of Patent: March 21, 2017
    Assignee: International Business Machines Corporation
    Inventors: Paul A. Ashley, Carsten Hagemann
  • Patent number: 9535731
    Abstract: A method of security sandboxing which may include detecting an illicit intrusion to a computer on a first computer system; cloning the intruded computer; directing all traffic from the illicit intrusion to the cloned computer; observing activities of the illicit intrusion interacting with the cloned computer; and dynamically adapting the cloned computer to perform activities of predicted interest to the illicit intrusion based on the observed activities of the illicit intrusion. The steps of the method may be performed by one or more computing devices.
    Type: Grant
    Filed: November 21, 2014
    Date of Patent: January 3, 2017
    Assignee: International Business Machines Corporation
    Inventors: Paul A. Ashley, Anthony M. Butler, Ghada M. ElKeissi, Leny Veliyathuparambil