Patents by Inventor Roy D'Souza

Roy D'Souza has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250254630
    Abstract: Disclosed in some examples are methods, systems, and machine-readable mediums in which interference is mitigated on a wireless radio frequency channel used by multiple computing devices by adjusting (e.g., lowering) the power level of one or more computing devices (e.g., mobile devises such as User Equipment (UE) devices) and using successive interference cancellation to decode the combined signals. Successive interference cancellation may first decode a strongest signal of a combined signal of all computing devices. The decoded signal is then subtracted from the combined signal. The strongest signal of that combined signal is then decoded and then subtracted and so on until all signals are decoded.
    Type: Application
    Filed: April 22, 2025
    Publication date: August 7, 2025
    Inventors: Amer Aref Hassan, Roy D. Kuntz
  • Patent number: 12325616
    Abstract: A method and apparatus for configuring and maintaining a beverage dispenser (10) are provided in which an array of flow control icons (60) is presented on the same page as functional sections (62-68). The functional sections (62-68) allow assignment of a beverage component to a flow control element corresponding to a selected flow control icon, and other functions to be performed in connection with the assigned beverage component or flow control element.
    Type: Grant
    Filed: October 9, 2023
    Date of Patent: June 10, 2025
    Assignee: Lancer Corporation
    Inventors: Joshua Anthony Cavazos, Roy D. Cole
  • Publication number: 20250139245
    Abstract: A system and method for detecting anomalies and malicious processes by analyzing current consumption profiles is disclosed. The technique involves generating current consumption profiles that characterize the expected power draw for known software applications operating in various modes on a target device. At runtime, the current being consumed by actively running applications is measured and compared to the total expected current draw determined from the individual profiles. Deviations between the observed and expected consumption indicate potential interference from malware or other unwanted processes. Additionally, current fluctuation profiles are generated to model the characteristic transient current behavior when applications transition between operational modes. By comparing runtime current measurements during state changes to these expected transitional profiles, the system can identify aberrations indicative of background malware triggering during the transitions.
    Type: Application
    Filed: October 26, 2023
    Publication date: May 1, 2025
    Inventors: Amer Aref Hassan, Roy D. KUNTZ, Whitney J. GIAIMO, Edward C. GIAIMO, III
  • Patent number: 12289690
    Abstract: Disclosed in some examples are methods, systems, and machine-readable mediums in which interference is mitigated on a wireless radio frequency channel used by multiple computing devices by adjusting (e.g., lowering) the power level of one or more computing devices (e.g., mobile devices such as User Equipment (UE) devices) and using successive interference cancellation to decode the combined signals. Successive interference cancellation may first decode a strongest signal of a combined signal of all computing devices. The decoded signal is then subtracted from the combined signal. The strongest signal of that combined signal is then decoded and then subtracted and so on until all signals are decoded.
    Type: Grant
    Filed: June 9, 2022
    Date of Patent: April 29, 2025
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amer Aref Hassan, Roy D. Kuntz
  • Publication number: 20250014098
    Abstract: Aspects of the disclosure provide for pre-deal and in-deal or live demand and allocation forecasting. For instance, historical data including information about prior completed offers may be accessed and used to generate a plurality of training input features and a plurality of training output features. These may be used to train a pre-deal demand model configured to generate a demand prediction for a new offer based on a plurality of input features for the new offer. In addition, these may be used to train a live demand model configured to generate a demand prediction for an offer while the offer is open based on a plurality of input features for the offer. Still further, a plurality of potential allocation policies to the demand prediction to generate an allocation in real time while the offer is open.
    Type: Application
    Filed: July 5, 2023
    Publication date: January 9, 2025
    Applicant: PrimaryBid Limited
    Inventors: Salil Shree Pandit, Brendan David Cheshire, Michael Christopher Coombes, Joseph Lyle Carnell, Andrew James Turner, Nafiseh Vahabi, Anand Sambasivan, Kieran Roy D’Silva, James Alexander Deal, Gavin David Sutton, Hanna Karpuk, Nicholas James Osborne, James Nicholas Sanderson Smith
  • Publication number: 20240333709
    Abstract: A system and method for preventing login lockout to a restricted space is provided. The system identifies first login information and prespecified login information that are used to access the restricted space. The prespecified login information has the first login information and an additional character. The system determines an event of failed login attempts based on failing to enter the first login information meeting a threshold condition of a preset amount of times. In response to failing to enter the first login information, the system requires a user to enter the prespecified login information in order to access the restricted space. The system can also determine that the correct prespecified login information was provided and then grant access to the restricted space.
    Type: Application
    Filed: March 31, 2023
    Publication date: October 3, 2024
    Inventors: Amer Aref Hassan, Roy D. KUNTZ
  • Patent number: 12035147
    Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums that detect evil twin and other anomalous access points in an IT infrastructure by detecting access points that are not in their expected locations based upon an analysis of access point reports from one or more computing devices.
    Type: Grant
    Filed: July 21, 2023
    Date of Patent: July 9, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amer Aref Hassan, Roy D. Kuntz, Michael Davis
  • Publication number: 20240034611
    Abstract: A method and apparatus for configuring and maintaining a beverage dispenser (10) are provided in which an array of flow control icons (60) is presented on the same page as functional sections (62-68). The functional sections (62-68) allow assignment of a beverage component to a flow control element corresponding to a selected flow control icon, and other functions to be performed in connection with the assigned beverage component or flow control element.
    Type: Application
    Filed: October 9, 2023
    Publication date: February 1, 2024
    Applicant: Lancer Corporation
    Inventors: Joshua Anthony Cavazos, Roy D. Cole
  • Publication number: 20230417003
    Abstract: Certain exemplary embodiments can provide a system, machine, device, and/or manufacture comprising a traffic separating median barrier comprising: a barrier body having a substantially uniform cross section along a longitudinally extending direction, said barrier body defining a body length extending along said longitudinally extending direction, a body width orthogonal to said body length, and a body height orthogonal to said body length and said body width, said barrier body terminating in a first barrier end region and a second barrier end region, said first barrier end region comprising a female interlocking structure attached to said barrier body, said second barrier end region comprising a male interlocking structure attached to said barrier body, said female interlocking structure adapted to interlock with said male interlocking structure.
    Type: Application
    Filed: September 13, 2023
    Publication date: December 28, 2023
    Applicant: Conmat Group, Inc.
    Inventors: Michael L. Budd, SR., Roy D. Simmons, JR.
  • Publication number: 20230413187
    Abstract: Disclosed in some examples are methods, systems, and machine-readable mediums in which interference is mitigated on a wireless radio frequency channel used by multiple computing devices by adjusting (e.g., lowering) the power level of one or more computing devices (e.g., mobile devises such as User Equipment (UE) devices) and using successive interference cancellation to decode the combined signals, Successive interference cancellation may first decode a strongest signal of a combined signal of all computing devices. The decoded signal is then subtracted from the combined signal. The strongest signal of that combined signal is then decoded and then subtracted and so on until all signals are decoded.
    Type: Application
    Filed: June 9, 2022
    Publication date: December 21, 2023
    Inventors: Amer Aref Hassan, Roy D. Kuntz
  • Patent number: 11842417
    Abstract: A system and method are provided for searching and monitoring assets available for acquisition. The method includes receiving a first signal including data associated with an acquiring entity, receiving a second signal including search data generated by the acquiring entity when interacting with at least one electronic listing service comprising searchable data associated with a plurality of assets available for acquisition, storing user profile data for the acquiring entity, the user profile data comprising at least a portion of the data associated with the acquiring entity, and at least a portion of the search data. The method also includes using the user profile data to search or monitor assets listed in the at least one electronic listing service to generate a result list of matched assets and sending a third signal including an electronic notification related to the result list, to a device associated with the acquiring entity.
    Type: Grant
    Filed: July 19, 2022
    Date of Patent: December 12, 2023
    Assignee: The Toronto-Dominion Bank
    Inventors: Patrick Gibbon, James Zachary Pryor, Jonathan K. Barnett, Roy D'Souza, William Stewart James Law, Christopher Arthur Holland McAlpine, Ethan Christopher McAlpine, Maria Verna, Patrick Robert Goralski, Cathleen Ruth Carrel, Rohan Anand, Christy Ann Dyba, Dheeraj Jagtiani, Ali Hafezi, Ashkan Alavi-Harati
  • Patent number: 11841913
    Abstract: A system and method are provided for controlling visibility of elements of displayed electronic content. The method includes providing via a communications module a user interface viewable by a plurality of entity devices, and enabling via the communications module the user interface to display electronic content comprising at least one element. The method also includes determining at least one filtering criterion for controlling visibility of the at least one element of the electronic content being displayed, and concealing or modifying at least one element of the electronic content as displayed in the user interface for at least one of the plurality of entity devices, according to the at least one filtering criterion.
    Type: Grant
    Filed: June 1, 2022
    Date of Patent: December 12, 2023
    Assignee: The Toronto-Dominion Bank
    Inventors: Patrick Gibbon, James Zachary Pryor, Jonathan K. Barnett, Roy D'Souza, William Stewart James Law, Christopher Arthur Holland McAlpine, Ethan Christopher McAlpine, Maria Verna, Patrick Robert Goralski, Cathleen Ruth Carrel, Rohan Anand, Christy Ann Dyba, Dheeraj Jagtiani, Ali Hafezi, Ashkan Alavi-Harati
  • Publication number: 20230362662
    Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums that detect evil twin and other anomalous access points in an IT infrastructure by detecting access points that are not in their expected locations based upon an analysis of access point reports from one or more computing devices.
    Type: Application
    Filed: July 21, 2023
    Publication date: November 9, 2023
    Inventors: Amer Aref Hassan, Roy D. KUNTZ, Michael Davis
  • Patent number: 11802038
    Abstract: A method and apparatus for configuring and maintaining a beverage dispenser (10) are provided in which an array of flow control icons (60) is presented on the same page as functional sections (62-68). The functional sections (62-68) allow assignment of a beverage component to a flow control element corresponding to a selected flow control icon, and other functions to be performed in connection with the assigned beverage component or flow control element.
    Type: Grant
    Filed: March 4, 2022
    Date of Patent: October 31, 2023
    Assignee: LANCER CORPORATION
    Inventor: Roy D. Cole
  • Patent number: 11777710
    Abstract: Disclosed are systems, methods, and non-transitory computer-readable media for cryptography using different sized symbol sets. To protect against a brute force or other similar type of attack, multiple symbol sets having different sizes can be used for encrypting/decrypting data. For example, different portions of the data (e.g., data blocks representing multiple symbols, set of bits representing a single symbol) may be encrypted/decrypted using different symbol sets that include different numbers of unique symbols. Using different sized symbol sets adds additional complexity to the encryption process, thereby greatly increasing the difficulty in decrypting the encrypted data with a brute force attack.
    Type: Grant
    Filed: September 28, 2022
    Date of Patent: October 3, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amer Aref Hassan, Whitney J Giaimo, Roy D. Kuntz
  • Publication number: 20230291565
    Abstract: According to an aspect, a method for accessing a computing device includes receiving, by the computing device, an authentication credential for recovery access to the computing device, the authentication credential being different from an authentication credential used to access encrypted data on the computing device, obtaining, in response to receipt of the authentication credential for recovery access, a first key portion stored on the computing device, transmitting, over a network, a request to receive a second key portion, receiving, over the network, a response that includes the second key portion, recovering a decryption key using the first key portion and the second key portion, and decrypting the encrypted data on the computing device using the decryption key.
    Type: Application
    Filed: May 19, 2023
    Publication date: September 14, 2023
    Inventors: Tony Ureche, Roy D′Souza, Stefan Kölbl
  • Patent number: 11751070
    Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums that detect evil twin and other anomalous access points in an IT infrastructure by detecting access points that are not in their expected locations based upon an analysis of access point reports from one or more computing devices.
    Type: Grant
    Filed: September 10, 2021
    Date of Patent: September 5, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amer Aref Hassan, Roy D Kuntz, Michael Davis
  • Patent number: 11689369
    Abstract: According to an aspect, a method for accessing a computing device includes receiving, by the computing device, an authentication credential for recovery access to the computing device, the authentication credential being different from an authentication credential used to access encrypted data on the computing device, obtaining, in response to receipt of the authentication credential for recovery access, a first key portion stored on the computing device, transmitting, over a network, a request to receive a second key portion, receiving, over the network, a response that includes the second key portion, recovering a decryption key using the first key portion and the second key portion, and decrypting the encrypted data on the computing device using the decryption key.
    Type: Grant
    Filed: August 11, 2021
    Date of Patent: June 27, 2023
    Assignee: Google LLC
    Inventors: Tony Ureche, Roy D'Souza, Stefan Kölbl
  • Publication number: 20230050003
    Abstract: According to an aspect, a method for accessing a computing device includes receiving, by the computing device, an authentication credential for recovery access to the computing device, the authentication credential being different from an authentication credential used to access encrypted data on the computing device, obtaining, in response to receipt of the authentication credential for recovery access, a first key portion stored on the computing device, transmitting, over a network, a request to receive a second key portion, receiving, over the network, a response that includes the second key portion, recovering a decryption key using the first key portion and the second key portion, and decrypting the encrypted data on the computing device using the decryption key.
    Type: Application
    Filed: August 11, 2021
    Publication date: February 16, 2023
    Inventors: Tony Ureche, Roy D'Souza, Stefan Kölbl
  • Patent number: D993140
    Type: Grant
    Filed: March 9, 2021
    Date of Patent: July 25, 2023
    Assignee: ADVENTURER MANUFACTURING INC.
    Inventors: Shawn M. Mathews, David Frampton, Matthew Hauck, Lee Roy D. Wood