Patents by Inventor Roy D'Souza
Roy D'Souza has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250254630Abstract: Disclosed in some examples are methods, systems, and machine-readable mediums in which interference is mitigated on a wireless radio frequency channel used by multiple computing devices by adjusting (e.g., lowering) the power level of one or more computing devices (e.g., mobile devises such as User Equipment (UE) devices) and using successive interference cancellation to decode the combined signals. Successive interference cancellation may first decode a strongest signal of a combined signal of all computing devices. The decoded signal is then subtracted from the combined signal. The strongest signal of that combined signal is then decoded and then subtracted and so on until all signals are decoded.Type: ApplicationFiled: April 22, 2025Publication date: August 7, 2025Inventors: Amer Aref Hassan, Roy D. Kuntz
-
Patent number: 12325616Abstract: A method and apparatus for configuring and maintaining a beverage dispenser (10) are provided in which an array of flow control icons (60) is presented on the same page as functional sections (62-68). The functional sections (62-68) allow assignment of a beverage component to a flow control element corresponding to a selected flow control icon, and other functions to be performed in connection with the assigned beverage component or flow control element.Type: GrantFiled: October 9, 2023Date of Patent: June 10, 2025Assignee: Lancer CorporationInventors: Joshua Anthony Cavazos, Roy D. Cole
-
Publication number: 20250139245Abstract: A system and method for detecting anomalies and malicious processes by analyzing current consumption profiles is disclosed. The technique involves generating current consumption profiles that characterize the expected power draw for known software applications operating in various modes on a target device. At runtime, the current being consumed by actively running applications is measured and compared to the total expected current draw determined from the individual profiles. Deviations between the observed and expected consumption indicate potential interference from malware or other unwanted processes. Additionally, current fluctuation profiles are generated to model the characteristic transient current behavior when applications transition between operational modes. By comparing runtime current measurements during state changes to these expected transitional profiles, the system can identify aberrations indicative of background malware triggering during the transitions.Type: ApplicationFiled: October 26, 2023Publication date: May 1, 2025Inventors: Amer Aref Hassan, Roy D. KUNTZ, Whitney J. GIAIMO, Edward C. GIAIMO, III
-
Patent number: 12289690Abstract: Disclosed in some examples are methods, systems, and machine-readable mediums in which interference is mitigated on a wireless radio frequency channel used by multiple computing devices by adjusting (e.g., lowering) the power level of one or more computing devices (e.g., mobile devices such as User Equipment (UE) devices) and using successive interference cancellation to decode the combined signals. Successive interference cancellation may first decode a strongest signal of a combined signal of all computing devices. The decoded signal is then subtracted from the combined signal. The strongest signal of that combined signal is then decoded and then subtracted and so on until all signals are decoded.Type: GrantFiled: June 9, 2022Date of Patent: April 29, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Amer Aref Hassan, Roy D. Kuntz
-
Publication number: 20250014098Abstract: Aspects of the disclosure provide for pre-deal and in-deal or live demand and allocation forecasting. For instance, historical data including information about prior completed offers may be accessed and used to generate a plurality of training input features and a plurality of training output features. These may be used to train a pre-deal demand model configured to generate a demand prediction for a new offer based on a plurality of input features for the new offer. In addition, these may be used to train a live demand model configured to generate a demand prediction for an offer while the offer is open based on a plurality of input features for the offer. Still further, a plurality of potential allocation policies to the demand prediction to generate an allocation in real time while the offer is open.Type: ApplicationFiled: July 5, 2023Publication date: January 9, 2025Applicant: PrimaryBid LimitedInventors: Salil Shree Pandit, Brendan David Cheshire, Michael Christopher Coombes, Joseph Lyle Carnell, Andrew James Turner, Nafiseh Vahabi, Anand Sambasivan, Kieran Roy D’Silva, James Alexander Deal, Gavin David Sutton, Hanna Karpuk, Nicholas James Osborne, James Nicholas Sanderson Smith
-
Publication number: 20240333709Abstract: A system and method for preventing login lockout to a restricted space is provided. The system identifies first login information and prespecified login information that are used to access the restricted space. The prespecified login information has the first login information and an additional character. The system determines an event of failed login attempts based on failing to enter the first login information meeting a threshold condition of a preset amount of times. In response to failing to enter the first login information, the system requires a user to enter the prespecified login information in order to access the restricted space. The system can also determine that the correct prespecified login information was provided and then grant access to the restricted space.Type: ApplicationFiled: March 31, 2023Publication date: October 3, 2024Inventors: Amer Aref Hassan, Roy D. KUNTZ
-
Patent number: 12035147Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums that detect evil twin and other anomalous access points in an IT infrastructure by detecting access points that are not in their expected locations based upon an analysis of access point reports from one or more computing devices.Type: GrantFiled: July 21, 2023Date of Patent: July 9, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Amer Aref Hassan, Roy D. Kuntz, Michael Davis
-
Publication number: 20240034611Abstract: A method and apparatus for configuring and maintaining a beverage dispenser (10) are provided in which an array of flow control icons (60) is presented on the same page as functional sections (62-68). The functional sections (62-68) allow assignment of a beverage component to a flow control element corresponding to a selected flow control icon, and other functions to be performed in connection with the assigned beverage component or flow control element.Type: ApplicationFiled: October 9, 2023Publication date: February 1, 2024Applicant: Lancer CorporationInventors: Joshua Anthony Cavazos, Roy D. Cole
-
Publication number: 20230417003Abstract: Certain exemplary embodiments can provide a system, machine, device, and/or manufacture comprising a traffic separating median barrier comprising: a barrier body having a substantially uniform cross section along a longitudinally extending direction, said barrier body defining a body length extending along said longitudinally extending direction, a body width orthogonal to said body length, and a body height orthogonal to said body length and said body width, said barrier body terminating in a first barrier end region and a second barrier end region, said first barrier end region comprising a female interlocking structure attached to said barrier body, said second barrier end region comprising a male interlocking structure attached to said barrier body, said female interlocking structure adapted to interlock with said male interlocking structure.Type: ApplicationFiled: September 13, 2023Publication date: December 28, 2023Applicant: Conmat Group, Inc.Inventors: Michael L. Budd, SR., Roy D. Simmons, JR.
-
Publication number: 20230413187Abstract: Disclosed in some examples are methods, systems, and machine-readable mediums in which interference is mitigated on a wireless radio frequency channel used by multiple computing devices by adjusting (e.g., lowering) the power level of one or more computing devices (e.g., mobile devises such as User Equipment (UE) devices) and using successive interference cancellation to decode the combined signals, Successive interference cancellation may first decode a strongest signal of a combined signal of all computing devices. The decoded signal is then subtracted from the combined signal. The strongest signal of that combined signal is then decoded and then subtracted and so on until all signals are decoded.Type: ApplicationFiled: June 9, 2022Publication date: December 21, 2023Inventors: Amer Aref Hassan, Roy D. Kuntz
-
Patent number: 11842417Abstract: A system and method are provided for searching and monitoring assets available for acquisition. The method includes receiving a first signal including data associated with an acquiring entity, receiving a second signal including search data generated by the acquiring entity when interacting with at least one electronic listing service comprising searchable data associated with a plurality of assets available for acquisition, storing user profile data for the acquiring entity, the user profile data comprising at least a portion of the data associated with the acquiring entity, and at least a portion of the search data. The method also includes using the user profile data to search or monitor assets listed in the at least one electronic listing service to generate a result list of matched assets and sending a third signal including an electronic notification related to the result list, to a device associated with the acquiring entity.Type: GrantFiled: July 19, 2022Date of Patent: December 12, 2023Assignee: The Toronto-Dominion BankInventors: Patrick Gibbon, James Zachary Pryor, Jonathan K. Barnett, Roy D'Souza, William Stewart James Law, Christopher Arthur Holland McAlpine, Ethan Christopher McAlpine, Maria Verna, Patrick Robert Goralski, Cathleen Ruth Carrel, Rohan Anand, Christy Ann Dyba, Dheeraj Jagtiani, Ali Hafezi, Ashkan Alavi-Harati
-
Patent number: 11841913Abstract: A system and method are provided for controlling visibility of elements of displayed electronic content. The method includes providing via a communications module a user interface viewable by a plurality of entity devices, and enabling via the communications module the user interface to display electronic content comprising at least one element. The method also includes determining at least one filtering criterion for controlling visibility of the at least one element of the electronic content being displayed, and concealing or modifying at least one element of the electronic content as displayed in the user interface for at least one of the plurality of entity devices, according to the at least one filtering criterion.Type: GrantFiled: June 1, 2022Date of Patent: December 12, 2023Assignee: The Toronto-Dominion BankInventors: Patrick Gibbon, James Zachary Pryor, Jonathan K. Barnett, Roy D'Souza, William Stewart James Law, Christopher Arthur Holland McAlpine, Ethan Christopher McAlpine, Maria Verna, Patrick Robert Goralski, Cathleen Ruth Carrel, Rohan Anand, Christy Ann Dyba, Dheeraj Jagtiani, Ali Hafezi, Ashkan Alavi-Harati
-
Publication number: 20230362662Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums that detect evil twin and other anomalous access points in an IT infrastructure by detecting access points that are not in their expected locations based upon an analysis of access point reports from one or more computing devices.Type: ApplicationFiled: July 21, 2023Publication date: November 9, 2023Inventors: Amer Aref Hassan, Roy D. KUNTZ, Michael Davis
-
Patent number: 11802038Abstract: A method and apparatus for configuring and maintaining a beverage dispenser (10) are provided in which an array of flow control icons (60) is presented on the same page as functional sections (62-68). The functional sections (62-68) allow assignment of a beverage component to a flow control element corresponding to a selected flow control icon, and other functions to be performed in connection with the assigned beverage component or flow control element.Type: GrantFiled: March 4, 2022Date of Patent: October 31, 2023Assignee: LANCER CORPORATIONInventor: Roy D. Cole
-
Patent number: 11777710Abstract: Disclosed are systems, methods, and non-transitory computer-readable media for cryptography using different sized symbol sets. To protect against a brute force or other similar type of attack, multiple symbol sets having different sizes can be used for encrypting/decrypting data. For example, different portions of the data (e.g., data blocks representing multiple symbols, set of bits representing a single symbol) may be encrypted/decrypted using different symbol sets that include different numbers of unique symbols. Using different sized symbol sets adds additional complexity to the encryption process, thereby greatly increasing the difficulty in decrypting the encrypted data with a brute force attack.Type: GrantFiled: September 28, 2022Date of Patent: October 3, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Amer Aref Hassan, Whitney J Giaimo, Roy D. Kuntz
-
Publication number: 20230291565Abstract: According to an aspect, a method for accessing a computing device includes receiving, by the computing device, an authentication credential for recovery access to the computing device, the authentication credential being different from an authentication credential used to access encrypted data on the computing device, obtaining, in response to receipt of the authentication credential for recovery access, a first key portion stored on the computing device, transmitting, over a network, a request to receive a second key portion, receiving, over the network, a response that includes the second key portion, recovering a decryption key using the first key portion and the second key portion, and decrypting the encrypted data on the computing device using the decryption key.Type: ApplicationFiled: May 19, 2023Publication date: September 14, 2023Inventors: Tony Ureche, Roy D′Souza, Stefan Kölbl
-
Patent number: 11751070Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums that detect evil twin and other anomalous access points in an IT infrastructure by detecting access points that are not in their expected locations based upon an analysis of access point reports from one or more computing devices.Type: GrantFiled: September 10, 2021Date of Patent: September 5, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Amer Aref Hassan, Roy D Kuntz, Michael Davis
-
Patent number: 11689369Abstract: According to an aspect, a method for accessing a computing device includes receiving, by the computing device, an authentication credential for recovery access to the computing device, the authentication credential being different from an authentication credential used to access encrypted data on the computing device, obtaining, in response to receipt of the authentication credential for recovery access, a first key portion stored on the computing device, transmitting, over a network, a request to receive a second key portion, receiving, over the network, a response that includes the second key portion, recovering a decryption key using the first key portion and the second key portion, and decrypting the encrypted data on the computing device using the decryption key.Type: GrantFiled: August 11, 2021Date of Patent: June 27, 2023Assignee: Google LLCInventors: Tony Ureche, Roy D'Souza, Stefan Kölbl
-
Publication number: 20230050003Abstract: According to an aspect, a method for accessing a computing device includes receiving, by the computing device, an authentication credential for recovery access to the computing device, the authentication credential being different from an authentication credential used to access encrypted data on the computing device, obtaining, in response to receipt of the authentication credential for recovery access, a first key portion stored on the computing device, transmitting, over a network, a request to receive a second key portion, receiving, over the network, a response that includes the second key portion, recovering a decryption key using the first key portion and the second key portion, and decrypting the encrypted data on the computing device using the decryption key.Type: ApplicationFiled: August 11, 2021Publication date: February 16, 2023Inventors: Tony Ureche, Roy D'Souza, Stefan Kölbl
-
Patent number: D993140Type: GrantFiled: March 9, 2021Date of Patent: July 25, 2023Assignee: ADVENTURER MANUFACTURING INC.Inventors: Shawn M. Mathews, David Frampton, Matthew Hauck, Lee Roy D. Wood