Patents by Inventor Peter Pearson
Peter Pearson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8881972Abstract: A system for verifying an item in a package using a database comprises a database and a verifier. A package producer provides the database with an identifier for one or more items each of a type, wherein the package producer produces a package, where the package includes the one or more items each of the type with an associated one or more selected tag identifiers that are placed in a location on an item of the one or more items. The verifier verifies the one or more items of the type using 1) the associated one or more selected tag identifiers as detected using a spectral measurement or 2) a tag characteristic as detected using an imager, and 3) the identifier retrieved from the database.Type: GrantFiled: June 10, 2011Date of Patent: November 11, 2014Assignee: TruTag Technologies, Inc.Inventors: Michael P. O'Neill, Peter Pearson, Ting Zhou, Timothy Learmonth
-
Publication number: 20140124398Abstract: A system verifying an item in a package comprises a package producer and a verifier. The package producer produces a package with a label, wherein the package includes an item each with one or more selected tag identifiers that are placed in a location on the item. The verifier verifies the item using 1) the one or more selected tag identifiers as detected using a spectral measurement or 2) a location or a shape of the one or more selected tag identifiers on the item, and 3) the label as read using a label reader.Type: ApplicationFiled: October 30, 2013Publication date: May 8, 2014Applicant: TruTag Technologies, Inc.Inventors: Timothy Learmonth, Michael P. O'Neill, Peter Pearson, Ting Zhou
-
Patent number: 8596546Abstract: A system verifying an item in a package comprises a package producer and a verifier. The package producer produces a package with a label, wherein the package includes an item each with one or more selected tag identifiers that are placed in a location on the item. The verifier verifies the item using 1) the one or more selected tag identifiers as detected using a spectral measurement or 2) a location or a shape of the one or more selected tag identifiers on the item, and 3) the label as read using a label reader.Type: GrantFiled: June 10, 2011Date of Patent: December 3, 2013Assignee: TruTag Technologies, Inc.Inventors: Timothy Learmonth, Michael P. O'Neill, Peter Pearson, Ting Zhou
-
Publication number: 20120302521Abstract: The present invention provides the use of an alginate Io inhibit pancreatic lipase. The use may be directed to the control of weight in animals including human beings. Preferably the fraction of guluronate dimers in the alginate is at least 0.5.Type: ApplicationFiled: November 25, 2010Publication date: November 29, 2012Applicants: UNIVERSITY OF NEWCASTLE UPON TYNE, RD BIOMED LIMITEDInventors: Johnathan Craig Richardson, Peter William Dettmar, Matthew David Wilcox, Iain Andrew Brownlee, Jeffrey Peter Pearson
-
Publication number: 20110303744Abstract: A system for verifying an item in a package using a database comprises a database and a verifier. A package producer provides the database with an identifier for one or more items each of a type, wherein the package producer produces a package, where the package includes the one or more items each of the type with an associated one or more selected tag identifiers that are placed in a location on an item of the one or more items. The verifier verifies the one or more items of the type using 1) the associated one or more selected tag identifiers as detected using a spectral measurement or 2) a tag characteristic as detected using an imager, and 3) the identifier retrieved from the database.Type: ApplicationFiled: June 10, 2011Publication date: December 15, 2011Applicant: TRUTAG TECHNOLOGIES, INC.Inventors: Michael P. O'Neill, Peter Pearson, Ting Zhou, Timothy Learmonth
-
Publication number: 20110303746Abstract: A system verifying an item in a package comprises a package producer and a verifier. The package producer produces a package with a label, wherein the package includes an item each with one or more selected tag identifiers that are placed in a location on the item. The verifier verifies the item using 1) the one or more selected tag identifiers as detected using a spectral measurement or 2) a location or a shape of the one or more selected tag identifiers on the item, and 3) the label as read using a label reader.Type: ApplicationFiled: June 10, 2011Publication date: December 15, 2011Applicant: TRUTAG TECHNOLOGIES, INC.Inventors: Timothy Learmonth, Michael P. O'Neill, Peter Pearson, Ting Zhou
-
Publication number: 20110303564Abstract: A system for packaging an item with an identifier comprises an identifier adder, a labeler, and a packager. The identifier adder adds one or more types of silica-based tags to an item, wherein each type of silica-based tag has a first signature readable using an optical spectroscopic reader. A label is generated based at least in part on reading the one or more types of silica-based tags of the item using the optical spectroscopic reader. The label includes goods info. The packager includes the label on a package, and wherein the packager includes the item in the package.Type: ApplicationFiled: June 10, 2011Publication date: December 15, 2011Applicant: TRUTAG TECHNOLOGIES, INC.Inventors: Peter Pearson, Ting Zhou, Timothy Learmonth, Michael P. O'Neill
-
Publication number: 20110304131Abstract: A system for manufacturing a label comprises a tag reader a computer, and a label writer. The tag reader determines an identifier based at least in part on a data read by the tag reader. The computer receives an identifier, a key, and a goods information and provides a message authentication code. The label writer receives the message authentication code and provides a label.Type: ApplicationFiled: June 10, 2011Publication date: December 15, 2011Applicant: TRUTAG TECHNOLOGIES, INC.Inventors: Ting Zhou, Timothy Learmonth, Michael P. O'Neill, Peter Pearson
-
Publication number: 20080101604Abstract: Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e.g., a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies.Type: ApplicationFiled: October 31, 2007Publication date: May 1, 2008Applicant: Cryptography Research, Inc.Inventors: Paul Kocher, Joshua Jaffe, Benjamin Jun, Carter Laren, Peter Pearson, Nathaniel Lawson
-
Publication number: 20080049935Abstract: In an exemplary embodiment, digital content is mastered as a combination of encrypted data and data processing operations that enable use in approved playback environments. Player devices having a processing environment compatible with the content's data processing operations are able to decrypt and play the content. Players can also provide content with basic functions, such as loading data from media, performing network communications, determining playback environment configuration, controlling decryption/playback, and/or performing cryptographic operations using the player's keys. These functions allow the content to implement and enforce its own security policies. If pirates compromise individual players or content titles, new content can be mastered with new security features that block the old attacks. A selective decryption capability can also be provided, enabling on-the-fly watermark insertion so that attacks can be traced back to a particular player.Type: ApplicationFiled: October 26, 2007Publication date: February 28, 2008Applicant: Cryptography Research, Inc.Inventors: Paul Kocher, Joshua Jaffe, Benjamin Jun, Matthew Carter, Peter Pearson
-
Publication number: 20080037781Abstract: In an exemplary embodiment, digital content is mastered as a combination of encrypted data and data processing operations that enable use in approved playback environments. Player devices having a processing environment compatible with the content's data processing operations are able to decrypt and play the content. Players can also provide content with basic functions, such as loading data from media, performing network communications, determining playback environment configuration, controlling decryption/playback, and/or performing cryptographic operations using the player's keys. These functions allow the content to implement and enforce its own security policies. If pirates compromise individual players or content titles, new content can be mastered with new security features that block the old attacks. A selective decryption capability can also be provided, enabling on-the-fly watermark insertion so that attacks can be traced back to a particular player.Type: ApplicationFiled: October 15, 2007Publication date: February 14, 2008Applicant: Cryptography Research, Inc.Inventors: Paul Kocher, Joshua Jaffe, Benjamin Jun, Matthew Carter, Peter Pearson
-
Publication number: 20070033419Abstract: Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc (200) carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e.g., a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations (225), access secure non-volatile storage, submit data to CODECs for output (250), and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies.Type: ApplicationFiled: July 7, 2004Publication date: February 8, 2007Applicant: CRYPTOGRAPHY RESEARCH, INC.Inventors: Paul Kocher, Joshua Jaffe, Benjamin Jun, Carter Laren, Peter Pearson, Nathaniel Lawson
-
Publication number: 20030176394Abstract: Certain alginates exhibit a superior ability to inhibit the proteolytic activity of pepsin and/or gastric juice. In particular, alginates having a molecular weight between 40,000 and 350,000 exhibit a superior inhibition of the proteolytic activity of pepsin and gastric juice by over 50% when measured using an N-terminal assay.Type: ApplicationFiled: March 13, 2003Publication date: September 18, 2003Inventors: Peter William Dettmar, Frank Chadwick Hampson, Andrew Michael Sunderland, Jeffrey Peter Pearson