Patents by Inventor Paul Roger HEATH

Paul Roger HEATH has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250094791
    Abstract: A computing system determines a maximum field size for a field containing values of quantized versions of a weight matrix, an input data matrix, and a bias matrix and determines a weight upper bound of scaling factors for the weight matrix based on values of the weight matrix, an input data upper bound of scaling factors for the input data matrix based on values of the input data matrix, and a bias upper bound of scaling factors for the bias matrix based on values of the bias matrix. The computing system also sets a weight scaling factor of the weight matrix, an input data scaling factor of the input data matrix, and a bias scaling factor for the bias matrix in two different cases: when the sum is less than or equal to the bias upper bound and when the sum is greater than the bias upper bound.
    Type: Application
    Filed: June 28, 2024
    Publication date: March 20, 2025
    Inventors: Foo Yee YEO, Yasaman KESHTKARJAHROMI, Paul Roger HEATH
  • Publication number: 20240362331
    Abstract: The technology disclosed herein provides batchwise metric-based malware detection by receiving a plurality of input/output (IO) requests, generating IO trace sequences by combining a number of IO requests, generating batchwise metrics, each of the batchwise metrics corresponding to one of the IO trace sequences and generated based on an operation performed on values of parameters within IO trace sequences, generating inferential model input feature vectors based on the generated batchwise metrics, and training an inferential model based on a plurality of the generated inferential model input feature vectors and ground truth values corresponding to the IO trace sequences, each of the ground truth values indicating whether a corresponding one of the IO trace sequences represents a ransomware attack.
    Type: Application
    Filed: April 29, 2024
    Publication date: October 31, 2024
    Inventors: Bhakti CHOWKWALE, Paul Roger HEATH, Rupasree ROY
  • Publication number: 20240005000
    Abstract: The technology disclosed herein provides a method including receiving a plurality of input/output (IO) requests at an object store, removing one or more fields from each of the plurality of input/output (IO) requests to generate a plurality of condensed IO requests, transforming one or more fields of each of the plurality of condensed IO requests to generate transformed IO requests, combining a predetermined number of transformed IO requests to generate IO trace temporal sequences, generating machine learning (ML) model input feature vectors by assigning each of the IO trace temporal sequences a ground truth value indicating whether the IO trace temporal sequence represents a ransomware attack, and training an ML model using a plurality of the ML model input feature vectors.
    Type: Application
    Filed: June 30, 2022
    Publication date: January 4, 2024
    Inventors: Paul Roger HEATH, Rupasree ROY