Patents by Inventor Samuel Jones
Samuel Jones has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12216640Abstract: Displaying visual indications of one or more files that are associated with a file being viewed via an augmented reality headset may be facilitated. In some embodiments, an image of a file being viewed by a user may be received. The system may determine whether a file is associated with a first error indicating an inconsistency between the file and one or more other files related to the file. Based on determining that the file is associated with the first error, the system may retrieve, based on one or more file identifiers corresponding to the one or more other files, one or more other files associated with the inconsistency. The system may then generate for display (i) a visual indicator indicating the first error and (ii) one or more visual indications of the one or more other files associated with the inconsistency.Type: GrantFiled: February 1, 2023Date of Patent: February 4, 2025Assignee: CAPITAL ONE SERVICES, LLCInventors: Samuel Rapowitz, John Jones, Michael Gaba
-
Publication number: 20250028774Abstract: A method may determine that first content in a first tab of a browser is associated with a first entity of an entity type and determine that second content in a second tab of the browser is associated with a second entity of the entity type. Responsive to determining that the first tab is associated with the first entity of the entity type and that the second tab is associated with the second entity of the entity type, a method may generate information used to provide a user interface for displaying first information for the first entity and second information for the second entity.Type: ApplicationFiled: July 19, 2024Publication date: January 23, 2025Inventors: Nasim Sedaghat, Esteban García Sánchez, Jorge Zuniga, Katharine Giari, Nicolas MacBeth, Sébastien Séguin-Gagnon, Samuel Birch, Ayman Almadhoun, Armina Foroughi-Shafiei, Rui Feng, Sara Hee Shin Park, Yue Zhang, Matthew Jones, Yu Liang Fang
-
Publication number: 20240146758Abstract: A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.Type: ApplicationFiled: December 21, 2023Publication date: May 2, 2024Inventors: Elliot Colquhoun, Abhishek Agarwal, Andrew Eggleton, Brandon Helms, Carl Ambroselli, Cem Zorlular, Daniel Kelly, Gautam Punukollu, Jeffrey Tsui, Morten Kromann, Nikhil Seetharaman, Raj Krishnan, Samuel Jones, Tareq Alkhatib, Dayang Shi
-
Patent number: 11956267Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for computer network security risk assessment. One of the methods includes obtaining compromise likelihoods for user accounts. Information describing a network topology of a network is obtained, with the network topology being nodes each connected by an edge to other nodes, each node being associated with a compromise likelihood, and one or more nodes are high value nodes associated with a compromise value. Unique paths to each of the high value nodes are determined for a particular user account. An expected value for each path is determined based on the compromise likelihood of the particular user account, the compromise likelihood of each node included in the path, the communication weight of each edge included in the path, and the compromise value associated with the high value node. User interface data is generated describing at least one path.Type: GrantFiled: July 23, 2021Date of Patent: April 9, 2024Assignee: Palantir Technologies Inc.Inventors: Samuel Jones, Joseph Staehle, Lucy Cheng
-
Patent number: 11882145Abstract: A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.Type: GrantFiled: June 21, 2022Date of Patent: January 23, 2024Assignee: Palantir Technologies Inc.Inventors: Elliot Colquhoun, Abhishek Agarwal, Andrew Eggleton, Brandon Helms, Carl Ambroselli, Cem Zorlular, Daniel Kelly, Gautam Punukollu, Jeffrey Tsui, Morten Kromann, Nikhil Seetharaman, Raj Krishnan, Samuel Jones, Tareq Alkhatib, Dayang Shi
-
Patent number: 11868171Abstract: Aspects of the invention include a converter device having at least the following: a housing including a button with a motor and a gear assembly, a wireless processor, an internal battery, and an attachment element to attach the housing to a host device. The button may be programmable to control the host device. In addition, the wireless processor is preconfigured with a specific identifier (e.g., SIM) to a mobile network or a user's mobile device so that upon activating the host device, the converter may be connected to the mobile network or the user's mobile device without any additional configurations.Type: GrantFiled: November 20, 2020Date of Patent: January 9, 2024Assignee: T-Mobile USA, Inc.Inventor: Anthony Samuel Jones, III
-
Patent number: 11704322Abstract: Systems and methods for rapid importation of data including temporally tracked object recognition. One of the methods includes receiving datasets each indicating information associated with one or more objects. Information indicating unique identifying information associated with the objects is accessed, and an updated dataset joining information from datasets that is associated with each object is generated. The updated dataset is maintained to include most recent versions of each of the datasets, with one or more datasets being replaced with more recent versions, and with one or more other datasets being propagated to be the most recent versions. Queries received from clients are responded to, with the queries indicating requests for specific information related to objects.Type: GrantFiled: March 5, 2021Date of Patent: July 18, 2023Assignee: Palantir Technologies Inc.Inventors: Samuel Jones, Sean Hacker
-
Patent number: 11470102Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network monitoring, user account compromise determination, and user behavior database system. The system monitors network actions of user accounts including user account access across multitudes of network accessible systems, determines user account transitions, and determines different types of high-risk user behavior indicative of compromise. Network actions can be obtained from generated information by the network accessible systems, and correlated across additional data sets including contextual ones. User interfaces are generated describing network actions of user accounts, and are configured for user interaction, which cause generation of updated user interfaces and access to electronic data sources to determine information relevant to the user interaction.Type: GrantFiled: November 12, 2018Date of Patent: October 11, 2022Assignee: Palantir Technologies Inc.Inventors: Samuel Jones, Timothy Yousaf, Drew Dennison, Vivek Lakshmanan, Joseph Staehle, Samuel Kremin, Maxim Kesin, Taylor Heroux
-
Publication number: 20220321595Abstract: A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.Type: ApplicationFiled: June 21, 2022Publication date: October 6, 2022Inventors: Elliot Colquhoun, Abhishek Agarwal, Andrew Eggleton, Brandon Helms, Carl Ambroselli, Cem Zorlular, Daniel Kelly, Gautam Punukollu, Jeffrey Tsui, Morten Kromann, Nikhil Seetharaman, Raj Krishnan, Samuel Jones, Tareq Alkhatib, Dayang Shi
-
Patent number: 11418529Abstract: A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.Type: GrantFiled: March 6, 2019Date of Patent: August 16, 2022Assignee: Palantir Technologies Inc.Inventors: Elliot Colquhoun, Abhishek Agarwal, Andrew Eggleton, Brandon Helms, Carl Ambroselli, Cem Zorlular, Daniel Kelly, Gautam Punukollu, Jeffrey Tsui, Morten Kromann, Nikhil Seetharaman, Raj Krishnan, Samuel Jones, Tareq Alkhatib, Dayang Shi
-
Publication number: 20220163993Abstract: Aspects of the invention include a converter device having at least the following: a housing including a button with a motor and a gear assembly, a wireless processor, an internal battery, and an attachment element to attach the housing to a host device. The button may be programmable to control the host device. In addition, the wireless processor is preconfigured with a specific identifier (e.g., SIM) to a mobile network or a user's mobile device so that upon activating the host device, the converter may be connected to the mobile network or the user's mobile device without any additional configurations.Type: ApplicationFiled: November 20, 2020Publication date: May 26, 2022Inventor: Anthony Samuel Jones, III
-
Patent number: 11310254Abstract: A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users, sorts similar users into cohorts, and compares new user activity to logged behavior of the cohort. The comparison can include a divergence calculation. Origins of user activity can also be used to determine anomalous network activity. The hostname, username, IP address, and timestamp can be used to calculate aggregate scores and convoluted scores.Type: GrantFiled: June 25, 2020Date of Patent: April 19, 2022Assignee: Palantir Technologies Inc.Inventors: Maxim Kesin, Samuel Jones
-
Publication number: 20220053015Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for computer network security risk assessment. One of the methods includes obtaining compromise likelihoods for user accounts. Information describing a network topology of a network is obtained, with the network topology being nodes each connected by an edge to other nodes, each node being associated with a compromise likelihood, and one or more nodes are high value nodes associated with a compromise value. Unique paths to each of the high value nodes are determined for a particular user account. An expected value for each path is determined based on the compromise likelihood of the particular user account, the compromise likelihood of each node included in the path, the communication weight of each edge included in the path, and the compromise value associated with the high value node. User interface data is generated describing at least one path.Type: ApplicationFiled: July 23, 2021Publication date: February 17, 2022Inventors: Samuel Jones, Joseph Staehle, Lucy Cheng
-
Patent number: 11160025Abstract: A computer-implemented method includes establishing a communication link between a first device of a first party and a second device of a second party that allows a communication between the first party and the second party, and periodically receiving a signal from the first device indicating a remaining battery power level of the first device during the communication. The method further includes communicating an alert to the second device over the communication link to notify the second party that the first device is near a battery power loss if the remaining battery power level falls below a predetermined threshold.Type: GrantFiled: March 31, 2020Date of Patent: October 26, 2021Assignee: T-MOBILE USA, INC.Inventors: Anthony Samuel Jones, III, Bhagwan Singh Khanka
-
Publication number: 20210306956Abstract: A computer-implemented method includes establishing a communication link between a first device of a first party and a second device of a second party that allows a communication between the first party and the second party, and periodically receiving a signal from the first device indicating a remaining battery power level of the first device during the communication. The method further includes communicating an alert to the second device over the communication link to notify the second party that the first device is near a battery power loss if the remaining battery power level falls below a predetermined threshold.Type: ApplicationFiled: March 31, 2020Publication date: September 30, 2021Inventors: Anthony Samuel Jones, III, Bhagwan Singh Khanka
-
Publication number: 20210263920Abstract: Systems and methods for rapid importation of data including temporally tracked object recognition. One of the methods includes receiving datasets each indicating information associated with one or more objects. Information indicating unique identifying information associated with the objects is accessed, and an updated dataset joining information from datasets that is associated with each object is generated. The updated dataset is maintained to include most recent versions of each of the datasets, with one or more datasets being replaced with more recent versions, and with one or more other datasets being propagated to be the most recent versions. Queries received from clients are responded to, with the queries indicating requests for specific information related to objects.Type: ApplicationFiled: March 5, 2021Publication date: August 26, 2021Inventors: Samuel Jones, Sean Hacker
-
Patent number: 11089043Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for computer network security risk assessment. One of the methods includes obtaining compromise likelihoods for user accounts. Information describing a network topology of a network is obtained, with the network topology being nodes each connected by an edge to other nodes, each node being associated with a compromise likelihood, and one or more nodes are high value nodes associated with a compromise value. Unique paths to each of the high value nodes are determined for a particular user account. An expected value for each path is determined based on the compromise likelihood of the particular user account, the compromise likelihood of each node included in the path, the communication weight of each edge included in the path, and the compromise value associated with the high value node. User interface data is generated describing at least one path.Type: GrantFiled: July 16, 2018Date of Patent: August 10, 2021Assignee: Palantir Technologies Inc.Inventors: Samuel Jones, Joseph Staehle, Lucy Cheng
-
Publication number: 20210137966Abstract: The invention relates to virucidal compounds, virucidal compositions comprising thereof and uses thereof in treatment of viral infections, for sterilizations and for disinfections.Type: ApplicationFiled: January 22, 2021Publication date: May 13, 2021Inventors: Samuel Jones, Francesco Stellacci
-
Patent number: 10963465Abstract: Systems and methods for rapid importation of data including temporally tracked object recognition. One of the methods includes receiving datasets each indicating information associated with one or more objects. Information indicating unique identifying information associated with the objects is accessed, and an updated dataset joining information from datasets that is associated with each object is generated. The updated dataset is maintained to include most recent versions of each of the datasets, with one or more datasets being replaced with more recent versions, and with one or more other datasets being propagated to be the most recent versions. Queries received from clients are responded to, with the queries indicating requests for specific information related to objects.Type: GrantFiled: November 2, 2017Date of Patent: March 30, 2021Assignee: Palantir Technologies Inc.Inventors: Samuel Jones, Sean Hacker
-
Publication number: 20200329064Abstract: A security system detects anomalous activity in a network. The system logs user activity, which can include ports used, compares users to find similar users, sorts similar users into cohorts, and compares new user activity to logged behavior of the cohort. The comparison can include a divergence calculation. Origins of user activity can also be used to determine anomalous network activity. The hostname, username, IP address, and timestamp can be used to calculate aggregate scores and convoluted scores.Type: ApplicationFiled: June 25, 2020Publication date: October 15, 2020Inventors: Maxim Kesin, Samuel Jones