Patents by Inventor Raymond Lloyd
Raymond Lloyd has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11924721Abstract: A system and a method to wirelessly synchronize, monitor, or communicate, or a combination thereof, amongst sensors (e.g., sensors, hubs, sensor controllers, etc.) in a Bluetooth Low Energy-based microlocation system. The system or method, or both, may use the BLE hardware (e.g., transmitters, receivers, antennas, etc.) to interleave a communications protocol within the connection interval gaps of the BLE protocol used to communicate with devices.Type: GrantFiled: July 19, 2022Date of Patent: March 5, 2024Assignee: DENSO CORPORATIONInventors: Raymond Michael Stitt, Eric John Smith, Tyler Lloyd Zoerner
-
Publication number: 20230405352Abstract: A photobiomodulation system that can be configured as a head wearable and user operated device. The device can include a head wearing portion for directing near infrared light therapy to the frontal lobes. Use of the device can result in reduced or mitigated symptoms of neurological or psychiatric disorder.Type: ApplicationFiled: January 6, 2023Publication date: December 21, 2023Inventor: Raymond Lloyd Harrington, III
-
Patent number: 11138512Abstract: Energy usage can be monitored within at least one building having a plurality of energy consuming components. A database can be generated that contains values for a set of data points corresponding to data received from the plurality of energy consuming components. A change in a configuration can be detected for the plurality of energy consuming components based upon a change in values received from plurality of energy consuming components relative to the database. Based upon the change, an additional data point can be added to the set of data points in the database. Based upon the values for the set of data points, a probability can be determined that a rule for the additional data point is valid. A message can then be generated that includes the determined probability.Type: GrantFiled: March 14, 2018Date of Patent: October 5, 2021Assignee: International Business Machines CorporationInventors: Niall Brady, Bernard Gorman, Raymond Lloyd, Joern Ploennigs, Anika Schumann, Olivier Verscheure
-
Patent number: 11017038Abstract: Embodiments for identifying and evaluating white space target entities by a processor. Data may be collected from a knowledge domain relating to a plurality of entities and text data extracted from one or more data sources. An enterprise social network graph may be created having one or more nodes relating to the collected data. The one or more nodes in the enterprise social network graph may be ranked. One or more potential target nodes may be recommended to a selected node as a candidate for establishing a potential relationship according to the ranking.Type: GrantFiled: September 29, 2017Date of Patent: May 25, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Adi I. Botea, Alice J. Chang, Elizabeth Daly, Raymond Lloyd, Xiaoxi Tian
-
Patent number: 10628465Abstract: A method of updating a plurality of databases storing place names includes collecting first, second and third coordinates of addresses including a first, a second and a third place name, respectively, clustering the first, second and third coordinates in a first, a second and a third cluster, respectively, obtaining a base address including the first place name and having base coordinates, assessing the best fit of the base coordinates to the first, second, and third clusters, and based on the two best fit clusters, identifying the second or third place name as an alias place name for the first place name. The method further includes obtaining alias addresses including the alias place name, fuzzy matching the base address to an alias address, and updating first and second databases by linking the alias address in the second database to the base address in the first database.Type: GrantFiled: December 31, 2017Date of Patent: April 21, 2020Assignee: International Business Machines CorporationInventors: Jeremiah P. Hayes, Raymond Lloyd, William Karol Lynch
-
Patent number: 10621216Abstract: A method of updating a plurality of databases storing place names includes collecting first, second and third coordinates of addresses including a first, a second and a third place name, respectively, clustering the first, second and third coordinates in a first, a second and a third cluster, respectively, obtaining a base address including the first place name and having base coordinates, assessing the best fit of the base coordinates to the first, second, and third clusters, and based on the two best fit clusters, identifying the second or third place name as an alias place name for the first place name. The method further includes obtaining alias addresses including the alias place name, fuzzy matching the base address to an alias address, and updating first and second databases by linking the alias address in the second database to the base address in the first database.Type: GrantFiled: February 28, 2017Date of Patent: April 14, 2020Assignee: International Business Machines CorporationInventors: Jeremiah P. Hayes, Raymond Lloyd, William Karol Lynch
-
Publication number: 20190102462Abstract: Embodiments for identifying and evaluating white space target entities by a processor. Data may be collected from a knowledge domain relating to a plurality of entities and text data extracted from one or more data sources. An enterprise social network graph may be created having one or more nodes relating to the collected data. The one or more nodes in the enterprise social network graph may be ranked. One or more potential target nodes may be recommended to a selected node as a candidate for establishing a potential relationship according to the ranking.Type: ApplicationFiled: September 29, 2017Publication date: April 4, 2019Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Adi I. BOTEA, Alice J. CHANG, Elizabeth DALY, Raymond LLOYD, Xiaoxi TIAN
-
Publication number: 20190057338Abstract: A method, computer system, and a computer program product for building a team to work on an opportunity is provided. The present invention may include receiving an opportunity signature based on the opportunity. The present invention may include determining a plurality of team roles. The present invention may include selecting a role to fill from the determined plurality of team roles. The present invention may include determining a plurality of candidates, wherein the plurality of candidates includes a plurality of candidate evidence data. The present invention may include selecting a candidate based on the plurality of candidate evidence data. The present invention may include assigning the selected candidate to fill the selected role. The present invention may include iteratively selecting at least one additional role and at least one additional candidate to fill the selected at least one additional role on the team until a stopping criterion is met.Type: ApplicationFiled: August 17, 2017Publication date: February 21, 2019Inventors: Adi I. Botea, Alice J. Chang, Elizabeth M. Daly, Raymond Lloyd, Xiaoxi Tian
-
Publication number: 20180246908Abstract: A method of updating a plurality of databases storing place names includes collecting first, second and third coordinates of addresses including a first, a second and a third place name, respectively, clustering the first, second and third coordinates in a first, a second and a third cluster, respectively, obtaining a base address including the first place name and having base coordinates, assessing the best fit of the base coordinates to the first, second, and third clusters, and based on the two best fit clusters, identifying the second or third place name as an alias place name for the first place name. The method further includes obtaining alias addresses including the alias place name, fuzzy matching the base address to an alias address, and updating first and second databases by linking the alias address in the second database to the base address in the first database.Type: ApplicationFiled: December 31, 2017Publication date: August 30, 2018Inventors: Jeremiah P. Hayes, Raymond Lloyd, William Karol Lynch
-
Publication number: 20180246906Abstract: A method of updating a plurality of databases storing place names includes collecting first, second and third coordinates of addresses including a first, a second and a third place name, respectively, clustering the first, second and third coordinates in a first, a second and a third cluster, respectively, obtaining a base address including the first place name and having base coordinates, assessing the best fit of the base coordinates to the first, second, and third clusters, and based on the two best fit clusters, identifying the second or third place name as an alias place name for the first place name. The method further includes obtaining alias addresses including the alias place name, fuzzy matching the base address to an alias address, and updating first and second databases by linking the alias address in the second database to the base address in the first database.Type: ApplicationFiled: February 28, 2017Publication date: August 30, 2018Inventors: Jeremiah P. Hayes, Raymond Lloyd, William Karol Lynch
-
Publication number: 20180204127Abstract: Energy usage can be monitored within at least one building having a plurality of energy consuming components. A database can be generated that contains values for a set of data points corresponding to data received from the plurality of energy consuming components. A change in a configuration can be detected for the plurality of energy consuming components based upon a change in values received from plurality of energy consuming components relative to the database. Based upon the change, an additional data point can be added to the set of data points in the database. Based upon the values for the set of data points, a probability can be determined that a rule for the additional data point is valid. A message can then be generated that includes the determined probability.Type: ApplicationFiled: March 14, 2018Publication date: July 19, 2018Inventors: Niall Brady, Bernard Gorman, Raymond Lloyd, Joern Ploennigs, Anika Schumann, Olivier Verscheure
-
Patent number: 9953266Abstract: Energy usage can be monitored within at least one building having a plurality of energy consuming components. A database can be generated that contains values for a set of data points corresponding to data received from the plurality of energy consuming components. A change in a configuration can be detected for the plurality of energy consuming components based upon a change in values received from plurality of energy consuming components relative to the database. Based upon the change, an additional data point can be added to the set of data points in the database. Based upon the values for the set of data points, a probability can be determined that a rule for the additional data point is valid. A message can then be generated that includes the determined probability.Type: GrantFiled: November 14, 2014Date of Patent: April 24, 2018Assignee: International Business Machines CorporationInventors: Niall Brady, Bernard Gorman, Raymond Lloyd, Joern Ploennigs, Anika Schumann, Olivier Verscheure
-
Publication number: 20170364682Abstract: An apparatus, system, and method is disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In response to detecting a form submission event from a browser associated with a user entering data into a form, confidential data is cleared to prevent it being captured by malware. Additional protection of data inputs, entered at a driver level, may be provided as an additional level of protection against hook based malware operating at a virtual keyboard level or operating system level. Data inputs received at a physical driver level may be protected as they pass through a virtual keyboard level and an operating system level. The projection against malware may be provided as a preventive measure that does not require detection of the key logger malware itself.Type: ApplicationFiled: September 5, 2017Publication date: December 21, 2017Inventor: Raymond Lloyd Reddington
-
Patent number: 9798879Abstract: An apparatus, system, and method is disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In response to detecting a form submission event from a browser associated with a user entering data into a form, confidential data is cleared to prevent it being captured by malware. Additional protection of data inputs, entered at a driver level, may be provided as an additional level of protection against hook based malware operating at a virtual keyboard level or operating system level. Data inputs received at a physical driver level may be protected as they pass through a virtual keyboard level and an operating system level. The projection against malware may be provided as a preventive measure that does not require detection of the key logger malware itself.Type: GrantFiled: June 7, 2017Date of Patent: October 24, 2017Assignee: Trusted Knight CorporationInventor: Raymond Lloyd Reddington
-
Patent number: 9772156Abstract: A method of installing a safety selector in a firearm includes inserting the safety selector into an opening in the firearm, aligning a hole extending through the safety selector with a cavity extending transversely from the opening, inserting a spring through the hole and into the cavity, inserting a detent plunger through the hole and at least partially into the cavity, thereby compressing the spring, and moving the safety selector within the opening transversely to the cavity so as to capture the detent plunger at least partially within the cavity. The invention also encompasses a method of removing the safety selector.Type: GrantFiled: April 27, 2017Date of Patent: September 26, 2017Assignee: Smith & Wesson Corp.Inventors: Matteo Vincenzio Viviano, Joshua Raymond Lloyd
-
Publication number: 20170270300Abstract: An apparatus, system, and method is disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In response to detecting a form submission event from a browser associated with a user entering data into a form, confidential data is cleared to prevent it being captured by malware. Additional protection of data inputs, entered at a driver level, may be provided as an additional level of protection against hook based malware operating at a virtual keyboard level or operating system level. Data inputs received at a physical driver level may be protected as they pass through a virtual keyboard level and an operating system level. The projection against malware may be provided as a preventive measure that does not require detection of the key logger malware itself.Type: ApplicationFiled: June 7, 2017Publication date: September 21, 2017Inventor: Raymond Lloyd Reddington
-
Patent number: 9690940Abstract: An apparatus, system, and method are disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In response to detecting a form submission event from a browser associated with a user entering data into a form, confidential data is prevented from being captured by malware. The protection against malware may be provided as a preventive measure that does not require detection of the key logger malware itself.Type: GrantFiled: November 18, 2016Date of Patent: June 27, 2017Assignee: TRUSTED KNIGHT CORPORATIONInventor: Raymond Lloyd Reddington
-
Patent number: 9659174Abstract: An apparatus, system, and method is disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In response to detecting a form submission event from a browser associated with a user entering data into a form, confidential data is cleared to prevent it being captured by malware. Additional protection of data inputs, entered at a driver level, may be provided as an additional level of protection against hook based malware operating at a virtual keyboard level or operating system level. Data inputs received at a physical driver level may be protected as they pass through a virtual keyboard level and an operating system level. The projection against malware may be provided as a preventive measure that does not require detection of the key logger malware itself.Type: GrantFiled: November 18, 2016Date of Patent: May 23, 2017Assignee: Trusted Knight CorporationInventor: Raymond Lloyd Reddington
-
Publication number: 20170078307Abstract: An apparatus, system, and method are disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In response to detecting a form submission event from a browser associated with a user entering data into a form, confidential data is prevented from being captured by malware. The protection against malware may be provided as a preventive measure that does not require detection of the key logger malware itself.Type: ApplicationFiled: November 18, 2016Publication date: March 16, 2017Inventor: Raymond Lloyd Reddington
-
Publication number: 20170076095Abstract: An apparatus, system, and method is disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware. In response to detecting a form submission event from a browser associated with a user entering data into a form, confidential data is cleared to prevent it being captured by malware. Additional protection of data inputs, entered at a driver level, may be provided as an additional level of protection against hook based malware operating at a virtual keyboard level or operating system level. Data inputs received at a physical driver level may be protected as they pass through a virtual keyboard level and an operating system level. The projection against malware may be provided as a preventive measure that does not require detection of the key logger malware itself.Type: ApplicationFiled: November 18, 2016Publication date: March 16, 2017Inventor: Raymond Lloyd Reddington