Patents by Inventor Raymond Lloyd

Raymond Lloyd has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11924721
    Abstract: A system and a method to wirelessly synchronize, monitor, or communicate, or a combination thereof, amongst sensors (e.g., sensors, hubs, sensor controllers, etc.) in a Bluetooth Low Energy-based microlocation system. The system or method, or both, may use the BLE hardware (e.g., transmitters, receivers, antennas, etc.) to interleave a communications protocol within the connection interval gaps of the BLE protocol used to communicate with devices.
    Type: Grant
    Filed: July 19, 2022
    Date of Patent: March 5, 2024
    Assignee: DENSO CORPORATION
    Inventors: Raymond Michael Stitt, Eric John Smith, Tyler Lloyd Zoerner
  • Publication number: 20230405352
    Abstract: A photobiomodulation system that can be configured as a head wearable and user operated device. The device can include a head wearing portion for directing near infrared light therapy to the frontal lobes. Use of the device can result in reduced or mitigated symptoms of neurological or psychiatric disorder.
    Type: Application
    Filed: January 6, 2023
    Publication date: December 21, 2023
    Inventor: Raymond Lloyd Harrington, III
  • Patent number: 11138512
    Abstract: Energy usage can be monitored within at least one building having a plurality of energy consuming components. A database can be generated that contains values for a set of data points corresponding to data received from the plurality of energy consuming components. A change in a configuration can be detected for the plurality of energy consuming components based upon a change in values received from plurality of energy consuming components relative to the database. Based upon the change, an additional data point can be added to the set of data points in the database. Based upon the values for the set of data points, a probability can be determined that a rule for the additional data point is valid. A message can then be generated that includes the determined probability.
    Type: Grant
    Filed: March 14, 2018
    Date of Patent: October 5, 2021
    Assignee: International Business Machines Corporation
    Inventors: Niall Brady, Bernard Gorman, Raymond Lloyd, Joern Ploennigs, Anika Schumann, Olivier Verscheure
  • Patent number: 11017038
    Abstract: Embodiments for identifying and evaluating white space target entities by a processor. Data may be collected from a knowledge domain relating to a plurality of entities and text data extracted from one or more data sources. An enterprise social network graph may be created having one or more nodes relating to the collected data. The one or more nodes in the enterprise social network graph may be ranked. One or more potential target nodes may be recommended to a selected node as a candidate for establishing a potential relationship according to the ranking.
    Type: Grant
    Filed: September 29, 2017
    Date of Patent: May 25, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Adi I. Botea, Alice J. Chang, Elizabeth Daly, Raymond Lloyd, Xiaoxi Tian
  • Patent number: 10628465
    Abstract: A method of updating a plurality of databases storing place names includes collecting first, second and third coordinates of addresses including a first, a second and a third place name, respectively, clustering the first, second and third coordinates in a first, a second and a third cluster, respectively, obtaining a base address including the first place name and having base coordinates, assessing the best fit of the base coordinates to the first, second, and third clusters, and based on the two best fit clusters, identifying the second or third place name as an alias place name for the first place name. The method further includes obtaining alias addresses including the alias place name, fuzzy matching the base address to an alias address, and updating first and second databases by linking the alias address in the second database to the base address in the first database.
    Type: Grant
    Filed: December 31, 2017
    Date of Patent: April 21, 2020
    Assignee: International Business Machines Corporation
    Inventors: Jeremiah P. Hayes, Raymond Lloyd, William Karol Lynch
  • Patent number: 10621216
    Abstract: A method of updating a plurality of databases storing place names includes collecting first, second and third coordinates of addresses including a first, a second and a third place name, respectively, clustering the first, second and third coordinates in a first, a second and a third cluster, respectively, obtaining a base address including the first place name and having base coordinates, assessing the best fit of the base coordinates to the first, second, and third clusters, and based on the two best fit clusters, identifying the second or third place name as an alias place name for the first place name. The method further includes obtaining alias addresses including the alias place name, fuzzy matching the base address to an alias address, and updating first and second databases by linking the alias address in the second database to the base address in the first database.
    Type: Grant
    Filed: February 28, 2017
    Date of Patent: April 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Jeremiah P. Hayes, Raymond Lloyd, William Karol Lynch
  • Publication number: 20190102462
    Abstract: Embodiments for identifying and evaluating white space target entities by a processor. Data may be collected from a knowledge domain relating to a plurality of entities and text data extracted from one or more data sources. An enterprise social network graph may be created having one or more nodes relating to the collected data. The one or more nodes in the enterprise social network graph may be ranked. One or more potential target nodes may be recommended to a selected node as a candidate for establishing a potential relationship according to the ranking.
    Type: Application
    Filed: September 29, 2017
    Publication date: April 4, 2019
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Adi I. BOTEA, Alice J. CHANG, Elizabeth DALY, Raymond LLOYD, Xiaoxi TIAN
  • Publication number: 20190057338
    Abstract: A method, computer system, and a computer program product for building a team to work on an opportunity is provided. The present invention may include receiving an opportunity signature based on the opportunity. The present invention may include determining a plurality of team roles. The present invention may include selecting a role to fill from the determined plurality of team roles. The present invention may include determining a plurality of candidates, wherein the plurality of candidates includes a plurality of candidate evidence data. The present invention may include selecting a candidate based on the plurality of candidate evidence data. The present invention may include assigning the selected candidate to fill the selected role. The present invention may include iteratively selecting at least one additional role and at least one additional candidate to fill the selected at least one additional role on the team until a stopping criterion is met.
    Type: Application
    Filed: August 17, 2017
    Publication date: February 21, 2019
    Inventors: Adi I. Botea, Alice J. Chang, Elizabeth M. Daly, Raymond Lloyd, Xiaoxi Tian
  • Publication number: 20180246908
    Abstract: A method of updating a plurality of databases storing place names includes collecting first, second and third coordinates of addresses including a first, a second and a third place name, respectively, clustering the first, second and third coordinates in a first, a second and a third cluster, respectively, obtaining a base address including the first place name and having base coordinates, assessing the best fit of the base coordinates to the first, second, and third clusters, and based on the two best fit clusters, identifying the second or third place name as an alias place name for the first place name. The method further includes obtaining alias addresses including the alias place name, fuzzy matching the base address to an alias address, and updating first and second databases by linking the alias address in the second database to the base address in the first database.
    Type: Application
    Filed: December 31, 2017
    Publication date: August 30, 2018
    Inventors: Jeremiah P. Hayes, Raymond Lloyd, William Karol Lynch
  • Publication number: 20180246906
    Abstract: A method of updating a plurality of databases storing place names includes collecting first, second and third coordinates of addresses including a first, a second and a third place name, respectively, clustering the first, second and third coordinates in a first, a second and a third cluster, respectively, obtaining a base address including the first place name and having base coordinates, assessing the best fit of the base coordinates to the first, second, and third clusters, and based on the two best fit clusters, identifying the second or third place name as an alias place name for the first place name. The method further includes obtaining alias addresses including the alias place name, fuzzy matching the base address to an alias address, and updating first and second databases by linking the alias address in the second database to the base address in the first database.
    Type: Application
    Filed: February 28, 2017
    Publication date: August 30, 2018
    Inventors: Jeremiah P. Hayes, Raymond Lloyd, William Karol Lynch
  • Publication number: 20180204127
    Abstract: Energy usage can be monitored within at least one building having a plurality of energy consuming components. A database can be generated that contains values for a set of data points corresponding to data received from the plurality of energy consuming components. A change in a configuration can be detected for the plurality of energy consuming components based upon a change in values received from plurality of energy consuming components relative to the database. Based upon the change, an additional data point can be added to the set of data points in the database. Based upon the values for the set of data points, a probability can be determined that a rule for the additional data point is valid. A message can then be generated that includes the determined probability.
    Type: Application
    Filed: March 14, 2018
    Publication date: July 19, 2018
    Inventors: Niall Brady, Bernard Gorman, Raymond Lloyd, Joern Ploennigs, Anika Schumann, Olivier Verscheure
  • Patent number: 9953266
    Abstract: Energy usage can be monitored within at least one building having a plurality of energy consuming components. A database can be generated that contains values for a set of data points corresponding to data received from the plurality of energy consuming components. A change in a configuration can be detected for the plurality of energy consuming components based upon a change in values received from plurality of energy consuming components relative to the database. Based upon the change, an additional data point can be added to the set of data points in the database. Based upon the values for the set of data points, a probability can be determined that a rule for the additional data point is valid. A message can then be generated that includes the determined probability.
    Type: Grant
    Filed: November 14, 2014
    Date of Patent: April 24, 2018
    Assignee: International Business Machines Corporation
    Inventors: Niall Brady, Bernard Gorman, Raymond Lloyd, Joern Ploennigs, Anika Schumann, Olivier Verscheure
  • Publication number: 20170364682
    Abstract: An apparatus, system, and method is disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In response to detecting a form submission event from a browser associated with a user entering data into a form, confidential data is cleared to prevent it being captured by malware. Additional protection of data inputs, entered at a driver level, may be provided as an additional level of protection against hook based malware operating at a virtual keyboard level or operating system level. Data inputs received at a physical driver level may be protected as they pass through a virtual keyboard level and an operating system level. The projection against malware may be provided as a preventive measure that does not require detection of the key logger malware itself.
    Type: Application
    Filed: September 5, 2017
    Publication date: December 21, 2017
    Inventor: Raymond Lloyd Reddington
  • Patent number: 9798879
    Abstract: An apparatus, system, and method is disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In response to detecting a form submission event from a browser associated with a user entering data into a form, confidential data is cleared to prevent it being captured by malware. Additional protection of data inputs, entered at a driver level, may be provided as an additional level of protection against hook based malware operating at a virtual keyboard level or operating system level. Data inputs received at a physical driver level may be protected as they pass through a virtual keyboard level and an operating system level. The projection against malware may be provided as a preventive measure that does not require detection of the key logger malware itself.
    Type: Grant
    Filed: June 7, 2017
    Date of Patent: October 24, 2017
    Assignee: Trusted Knight Corporation
    Inventor: Raymond Lloyd Reddington
  • Patent number: 9772156
    Abstract: A method of installing a safety selector in a firearm includes inserting the safety selector into an opening in the firearm, aligning a hole extending through the safety selector with a cavity extending transversely from the opening, inserting a spring through the hole and into the cavity, inserting a detent plunger through the hole and at least partially into the cavity, thereby compressing the spring, and moving the safety selector within the opening transversely to the cavity so as to capture the detent plunger at least partially within the cavity. The invention also encompasses a method of removing the safety selector.
    Type: Grant
    Filed: April 27, 2017
    Date of Patent: September 26, 2017
    Assignee: Smith & Wesson Corp.
    Inventors: Matteo Vincenzio Viviano, Joshua Raymond Lloyd
  • Publication number: 20170270300
    Abstract: An apparatus, system, and method is disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In response to detecting a form submission event from a browser associated with a user entering data into a form, confidential data is cleared to prevent it being captured by malware. Additional protection of data inputs, entered at a driver level, may be provided as an additional level of protection against hook based malware operating at a virtual keyboard level or operating system level. Data inputs received at a physical driver level may be protected as they pass through a virtual keyboard level and an operating system level. The projection against malware may be provided as a preventive measure that does not require detection of the key logger malware itself.
    Type: Application
    Filed: June 7, 2017
    Publication date: September 21, 2017
    Inventor: Raymond Lloyd Reddington
  • Patent number: 9690940
    Abstract: An apparatus, system, and method are disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In response to detecting a form submission event from a browser associated with a user entering data into a form, confidential data is prevented from being captured by malware. The protection against malware may be provided as a preventive measure that does not require detection of the key logger malware itself.
    Type: Grant
    Filed: November 18, 2016
    Date of Patent: June 27, 2017
    Assignee: TRUSTED KNIGHT CORPORATION
    Inventor: Raymond Lloyd Reddington
  • Patent number: 9659174
    Abstract: An apparatus, system, and method is disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In response to detecting a form submission event from a browser associated with a user entering data into a form, confidential data is cleared to prevent it being captured by malware. Additional protection of data inputs, entered at a driver level, may be provided as an additional level of protection against hook based malware operating at a virtual keyboard level or operating system level. Data inputs received at a physical driver level may be protected as they pass through a virtual keyboard level and an operating system level. The projection against malware may be provided as a preventive measure that does not require detection of the key logger malware itself.
    Type: Grant
    Filed: November 18, 2016
    Date of Patent: May 23, 2017
    Assignee: Trusted Knight Corporation
    Inventor: Raymond Lloyd Reddington
  • Publication number: 20170078307
    Abstract: An apparatus, system, and method are disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In response to detecting a form submission event from a browser associated with a user entering data into a form, confidential data is prevented from being captured by malware. The protection against malware may be provided as a preventive measure that does not require detection of the key logger malware itself.
    Type: Application
    Filed: November 18, 2016
    Publication date: March 16, 2017
    Inventor: Raymond Lloyd Reddington
  • Publication number: 20170076095
    Abstract: An apparatus, system, and method is disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In response to detecting a form submission event from a browser associated with a user entering data into a form, confidential data is cleared to prevent it being captured by malware. Additional protection of data inputs, entered at a driver level, may be provided as an additional level of protection against hook based malware operating at a virtual keyboard level or operating system level. Data inputs received at a physical driver level may be protected as they pass through a virtual keyboard level and an operating system level. The projection against malware may be provided as a preventive measure that does not require detection of the key logger malware itself.
    Type: Application
    Filed: November 18, 2016
    Publication date: March 16, 2017
    Inventor: Raymond Lloyd Reddington