Patents by Inventor Robert HERCOCK

Robert HERCOCK has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250149784
    Abstract: A 3D printed antenna device comprising a cavity connected between an anode and a cathode and configured to resonate at a predetermined frequency and power to generate an output feed; and an antenna element configured to receive the output feed from the cavity.
    Type: Application
    Filed: December 13, 2022
    Publication date: May 8, 2025
    Inventor: Robert HERCOCK
  • Patent number: 12267337
    Abstract: A computer implemented method of feature detection in temporal graph data structures of events, the method including receiving a temporal series of graph data structures of events each including a plurality of nodes corresponding to events and edges connecting nodes corresponding to relationships between events; rendering each graph data structure in the series as an image representation of the graph data structure including a representation of nodes and edges in the graph being rendered reproducibly in a cartesian space based on attributes of the nodes and edges, so as to generate a temporal series of image representations ordered according to the temporal graph data structures; processing the series of image representations by a convolutional neural network to classify the image series so as to identify a feature in the image series, the convolutional neural network being trained by a supervised training method including a plurality of training example image series in which a subset of the training examples
    Type: Grant
    Filed: March 18, 2020
    Date of Patent: April 1, 2025
    Assignee: British Telecommunications Public Limited Company United
    Inventor: Robert Hercock
  • Publication number: 20250005009
    Abstract: In various examples there is a database management system which has a memory storing a plurality of addresses of items. The database management system has a mapping component for computing a mapped location of each item in a plane or volume comprising a plurality of tessellated cells. The memory stores, for individual ones of the items, the mapped location of the item.
    Type: Application
    Filed: October 5, 2022
    Publication date: January 2, 2025
    Inventor: Robert HERCOCK
  • Publication number: 20240419205
    Abstract: An optical computing device is described which has a plurality of light sources, each light source arranged to generate a photon stream, whereby the plurality of photon streams together represent a data input to be processed. There is a plurality of modulators, each modulator arranged to modulate a photon stream received from one of the light sources, each modulator producing a caustic wavefront. The modulators are positioned relative to one another such that there is interference between the caustic wavefronts. A controller controls the modulators in order to control the interference between the caustic wavefronts such that there is computation of the data input. An output stage outputs light resulting from the interference between the caustic wavefronts, the output light representing the result of optical computation of the data input.
    Type: Application
    Filed: November 8, 2022
    Publication date: December 19, 2024
    Inventor: Robert HERCOCK
  • Publication number: 20240403468
    Abstract: A beacon device transmits a challenge message to each of one or more responder devices over a respective direct communication link, inviting each responder device to prove the existence of its respective direct communication link by transmitting to a respective recipient device, distinct from the beacon device, a respective response message indicating knowledge of contents of the challenge message. A predetermined time period after its transmission of the challenge message, the beacon device transmits a confirmation message indicating knowledge of the contents of the challenge message to a message store. A validation device then compares contents of each response message which preceded the confirmation message in time, if any, to contents of the confirmation message and infers therefrom which of the respective responder devices, if any, received the challenge message over the respective direct communication link.
    Type: Application
    Filed: August 23, 2022
    Publication date: December 5, 2024
    Inventors: Catherine WHITE, Jonathan ROSCOE, Robert HERCOCK, Ruth WRIGHT
  • Publication number: 20240394332
    Abstract: A computer implemented method for detecting the existence of a condition indicated by a signature vector sequence of events in an input vector sequence of events, each of the signature and input vector sequences being constituted by an ordered sequence of vectors, can include converting the signature vector sequence into an signature ordered numerical sequence in which each vector in the signature vector sequence is converted to a number indicative of a magnitude of the vector such that the signature numerical sequence is a sequence of magnitudes in the order of the signature vector sequence; converting the input vector sequence into an input ordered numerical sequence in which each vector in the input vector sequence is converted to a number indicative of a magnitude of the vector such that the input numerical sequence is a sequence of magnitudes in the order of the input vector sequence; and determining a degree of similarity of the signature numerical sequence and the input numerical sequence to detect the
    Type: Application
    Filed: August 24, 2022
    Publication date: November 28, 2024
    Inventors: Jonathan ROSCOE, Robert HERCOCK, Max SMITH-CREASEY
  • Publication number: 20240394393
    Abstract: A computer implemented method for detecting the existence of a condition indicated by data represented by a set of input graph data structures can include receiving at least a pair of training graph data structures of nodes and edges wherein each node indicates one or more characteristics of an event and each edge indicates an association between events, and wherein at least a subset of nodes and edges in each training graph relate to the existence of the condition, identifying an association between at least one pair of nodes in which each node of a pair occurs in a disparate training graph and at least one of the pair of nodes relates to the existence of the condition, and generating an edge between the pair of nodes so as to generate a composite training graph including at least a pair of the training graph data structures; extracting a proper subgraph of the composite training graph including at least one of the at least one pair of nodes, such that the proper subgraph indicates the existence of the condi
    Type: Application
    Filed: August 24, 2022
    Publication date: November 28, 2024
    Inventors: Jonathan ROSCOE, Robert HERCOCK
  • Publication number: 20240395018
    Abstract: A computer implemented method for detecting an occurrence of an event indicated by a set of data records, the event being associated with an event type, can include receiving a plurality of sets of training data records, each training data record having associated a geospatial indication, wherein the training data records in each set relate to an occurrence of an event of the event type; generating a training bitmap to represent each set of training data records in the plurality of sets, the bitmap defining a representation of a geospatial region including the locations identified by geospatial indications of training data records in the set, and the bitmap including identifications of each training data record in the set mapped into the geospatial region of the bitmap; training an image classifier based on each training bitmap such that the trained classifier is operable to classify an input bitmap as indicating an event of the event type.
    Type: Application
    Filed: August 24, 2022
    Publication date: November 28, 2024
    Inventors: Jonathan ROSCOE, Robert HERCOCK
  • Publication number: 20240340648
    Abstract: A beacon device including directional transmission means transmits a challenge message in a first predetermined direction to each of one or more responder devices over a respective direct radio communication link, to invite the responder devices to each transmit a respective response message indicating knowledge of contents of the challenge message. The beacon device transmits one or more directed repetitions of the challenge message in one or more respective further predetermined directions such that data relating to the location of each of the responder devices can be inferred from timings of each response message with respect to times the challenge message and the directed repetitions of the challenge message were transmitted. The beacon device either engages in or eschews subsequent two-way communication with each of the one or more responder devices over the respective direct radio communication link, in dependence on the existence and timing of a respective response message.
    Type: Application
    Filed: August 23, 2022
    Publication date: October 10, 2024
    Inventors: Catherine WHITE, Jonathan ROSCOE, Robert HERCOCK, Ruth WRIGHT
  • Patent number: 11989307
    Abstract: A computer implemented method of detecting an increased vulnerability of a software system including a plurality of software components, the method including generating a vector representation of each software component derived from a neural network trained using training data defined from known vulnerabilities of the software components in the software system; aggregating the vector representations for the software component to an aggregate vector representation for a particular time; repeating the generating and the aggregating for a plurality of points in time to generate multiple generations of aggregate vector representations; and comparing the multiple generations of aggregate vector representations to detect a change in an aggregate vector representation exceeding a maximum threshold degree of change as an indication of an increased vulnerability of the software system.
    Type: Grant
    Filed: December 1, 2019
    Date of Patent: May 21, 2024
    Assignee: British Telecommunications Public Company Limited
    Inventors: Robert Hercock, Giulio Giaconi
  • Patent number: 11989289
    Abstract: A computer implemented method of remediating an increased vulnerability of a software system including a plurality of software components, the method including generating a vector representation of each software component derived from a neural network trained using training data defined from known vulnerabilities of the software components in the software system; aggregating the vector representations for the software component to an aggregate vector representation for a particular time; repeating the generating and the aggregating for a plurality of points in time to generate multiple generations of aggregate vector representations; comparing the multiple generations of aggregate vector representations to detect a change in an aggregate vector representation exceeding a maximum threshold degree of change as an indication of an increased vulnerability of the software system, responsive to which iteratively adjusting the software components in the software system and, at each iteration, regenerating an aggrega
    Type: Grant
    Filed: December 1, 2019
    Date of Patent: May 21, 2024
    Assignee: British Telecommunications Public Limited Company
    Inventors: Robert Hercock, Giulio Giaconi
  • Patent number: 11960610
    Abstract: A computer implemented method of detecting an increased vulnerability of a software system including a plurality of software components, the method including generating a vector representation of each software component derived from a neural network trained using training data defined from known vulnerabilities of the software components in the software system, wherein the training data is augmented by replicating each of one or more training data items in the training data responsive to one or more attributes of a vulnerability corresponding to the training data item; aggregating the vector representations for the software component to an aggregate vector representation for a particular time; repeating the generating and the aggregating for a plurality of points in time to generate multiple generations of aggregate vector representations; comparing the multiple generations of aggregate vector representations to detect a change in an aggregate vector representation exceeding a maximum threshold degree of chan
    Type: Grant
    Filed: December 1, 2019
    Date of Patent: April 16, 2024
    Assignee: British Telecommunications Public Limited Company
    Inventors: Robert Hercock, Giulio Giaconi
  • Publication number: 20240078424
    Abstract: A computer implemented method of a machine learning algorithm modelling a target function mapping inputs in an input domain to outputs in an output range, the machine learning algorithm including an array of processing nodes arranged in a network of layers of nodes including an input layer for receiving an input value, an output layer for providing an output value, and one or more intermediate layers between the input and output layers, each node in the processing set being outside the input layer receiving input from at least some adjacent nodes logically closer to the input layer via weighted connections between nodes, and each node being outside the output layer generating output to at least some adjacent nodes logically closer to the output layer via weighted connections between nodes, wherein each node includes: an adjustable weight for application to each input to the node, the adjustment weight being responsive to a threshold function applied to a value of the node input; a combination function for com
    Type: Application
    Filed: December 1, 2021
    Publication date: March 7, 2024
    Inventors: Robert HERCOCK, Alexander HEALING
  • Publication number: 20240045962
    Abstract: A computer implemented method of clustering computer systems in a plurality of systems to identify computer systems being subject to a common security occurrence, each computer system generating data records corresponding to security events in respect the systems, the method comprising: receiving a set of one or more data records associated with each computer system, each record including a sequence of data fields; generate a vector embedding for each data field in each record; evaluate a distance of each vector embedding from a reference vector as an indicator of semantic distance; identifying similar data records based on a measure of a degree of similarity of the distances of vector embeddings for each record; defining a cluster of computer systems including computer systems associated with the similar data records for applying protective measures to the computer systems in the cluster.
    Type: Application
    Filed: December 7, 2021
    Publication date: February 8, 2024
    Inventors: Robert HERCOCK, Jonathan ROSCOE
  • Publication number: 20230274406
    Abstract: A computer implemented method of determining an association between disparate first and second data items wherein the second data item is at least partly derived from the first data item, the method comprising: evaluating a cryptographic hash to each result of each of a plurality of disparate feature extraction methods, each feature extraction method being applied to each of the first and second data items to generate a set of hashes for each data item; responsive to a non-empty set of hashes in the intersect of the sets of hashes for each data item, identifying an association between the first and second data items.
    Type: Application
    Filed: September 27, 2021
    Publication date: August 31, 2023
    Inventors: Jonathan ROSCOE, Robert HERCOCK
  • Publication number: 20220255953
    Abstract: A computer implemented method of feature detection in temporal graph data structures of events, the method including receiving a temporal series of graph data structures of events each including a plurality of nodes corresponding to events and edges connecting nodes corresponding to relationships between events; rendering each graph data structure in the series as an image representation of the graph data structure including a representation of nodes and edges in the graph being rendered reproducibly in a cartesian space based on attributes of the nodes and edges, so as to generate a temporal series of image representations ordered according to the temporal graph data structures; processing the series of image representations by a convolutional neural network to classify the image series so as to identify a feature in the image series, the convolutional neural network being trained by a supervised training method including a plurality of training example image series in which a subset of the training examples
    Type: Application
    Filed: March 18, 2020
    Publication date: August 11, 2022
    Inventor: Robert HERCOCK
  • Publication number: 20220027478
    Abstract: A computer implemented method of detecting an increased vulnerability of a software system including a plurality of software components, the method including generating a vector representation of each software component derived from a neural network trained using training data defined from known vulnerabilities of the software components in the software system, wherein the training data is augmented by replicating each of one or more training data items in the training data responsive to one or more attributes of a vulnerability corresponding to the training data item; aggregating the vector representations for the software component to an aggregate vector representation for a particular time; repeating the generating and the aggregating for a plurality of points in time to generate multiple generations of aggregate vector representations; comparing the multiple generations of aggregate vector representations to detect a change in an aggregate vector representation exceeding a maximum threshold degree of chan
    Type: Application
    Filed: December 1, 2019
    Publication date: January 27, 2022
    Inventors: Robert HERCOCK, Giulio GIACONI
  • Publication number: 20220027477
    Abstract: A computer implemented method of detecting an increased vulnerability of a software system including a plurality of software components, the method including generating a vector representation of each software component derived from a neural network trained using training data defined from known vulnerabilities of the software components in the software system; aggregating the vector representations for the software component to an aggregate vector representation for a particular time; repeating the generating and the aggregating for a plurality of points in time to generate multiple generations of aggregate vector representations; and comparing the multiple generations of aggregate vector representations to detect a change in an aggregate vector representation exceeding a maximum threshold degree of change as an indication of an increased vulnerability of the software system.
    Type: Application
    Filed: December 1, 2019
    Publication date: January 27, 2022
    Inventors: Robert HERCOCK, Giulio GIACONI
  • Publication number: 20220027465
    Abstract: A computer implemented method of remediating an increased vulnerability of a software system including a plurality of software components, the method including generating a vector representation of each software component derived from a neural network trained using training data defined from known vulnerabilities of the software components in the software system; aggregating the vector representations for the software component to an aggregate vector representation for a particular time; repeating the generating and the aggregating for a plurality of points in time to generate multiple generations of aggregate vector representations; comparing the multiple generations of aggregate vector representations to detect a change in an aggregate vector representation exceeding a maximum threshold degree of change as an indication of an increased vulnerability of the software system, responsive to which iteratively adjusting the software components in the software system and, at each iteration, regenerating an aggrega
    Type: Application
    Filed: December 1, 2019
    Publication date: January 27, 2022
    Inventors: Robert HERCOCK, Giulio GIACONI