Patents by Inventor Scott D. Johnson

Scott D. Johnson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11934090
    Abstract: Various embodiments include a camera with folded optics and lens shifting capabilities. Some embodiments include voice coil motor (VCM) actuator arrangements to provide autofocus (AF) and/or optical image stabilization (OIS) movement. Some embodiments include suspension arrangements.
    Type: Grant
    Filed: April 2, 2021
    Date of Patent: March 19, 2024
    Assignee: Apple Inc.
    Inventors: Scott W. Miller, Alfred N. Mireault, Brad V. Johnson, Nicholas D. Smyth, Rummel R. Adriano, Shashank Sharma, Steven Webster
  • Patent number: 11574731
    Abstract: To identify relevant action items (that may ultimately be reflected as claims data) for closing an identified gap in care reflected by combinations of disparate claims data records within a claims data store, a task-based interventional system executes rule-based models to determine action items eligible for closing a particular gap in care identified based on criteria associated with one or more programs. The task-based interventional system executes one or more machine-learning models to generate care scores associated with relevant entities associated with the identified gaps in care and generates a task data object comprising data indicative of an action item to close the gap in care together with executable jobs for initiating computer-based workflows to provide data indicative of the gap in care to relevant entities.
    Type: Grant
    Filed: June 17, 2020
    Date of Patent: February 7, 2023
    Assignee: Optum, Inc.
    Inventors: Scott D. Johnson, Mallory B. Van Horn, Michael B. Wentzien
  • Publication number: 20220292226
    Abstract: An IC chip can provide silicon root of trust (RoT) functionality. In described implementations, the IC chip includes a processor, an interconnect, and multiple peripheral devices. These comportable circuit components are designed to facilitate interoperability and consistent, expected communications for security circuitry. Each peripheral device includes an interface that adheres to a common framework for interacting with the processor and with other peripheral devices. The interface includes an interconnect interface coupling the peripheral device to the interconnect and an inter-device interface coupling the peripheral device to at least one other peripheral device. The peripheral device is realized based on a peripheral device design code that indicates inter-device signaling in accordance with an inter-device scheme of an interface specification.
    Type: Application
    Filed: October 31, 2020
    Publication date: September 15, 2022
    Applicant: Google LLC
    Inventors: Scott D. Johnson, Timothy Jay Chen, Mark David Hayter, Dominic Anthony Rizzo, Eunchan Kim, Michael Stefano Fritz Schaffner
  • Publication number: 20220292228
    Abstract: An IC chip can provide silicon root of trust (RoT) functionality. In described implementations, the IC chip includes a processor, an alert handler, and multiple peripheral devices, which generate alert indications. The alert handler processes the alert indications, which have security implications. The alert handler includes multiple alert receiver modules to communicate with the multiple peripheral devices. The alert handler also includes a controller, multiple accumulation units, multiple escalation timers, and multiple escalation sender modules. These components can be organized into a hierarchy of increasing escalation severity. In operation, the controller classifies an alert and flexibly implements an adaptable alert handler path that is established through the escalation components responsive to the classification and based on a source of the alert. A path can conclude with an escalation sender module commanding an escalation handler to implement a security countermeasure.
    Type: Application
    Filed: October 31, 2020
    Publication date: September 15, 2022
    Applicant: Google LLC
    Inventors: Scott D. Johnson, Timothy Jay Chen, Christopher Gori, Eunchan Kim, Michael Stefano Fritz Schaffner
  • Publication number: 20220247740
    Abstract: Techniques and apparatuses are described that enable integrated second factor authentication. These techniques and apparatuses enable the improved security of something you have without the accompanying inconvenience or chance of loss. To do so, a secure physical entity is integrated within a computing device. While this provides the something you have without a need to carry a separate object with you, the something you have also must not be able to be accessed remotely. To prevent remote access physical wires are connected from the secure physical entity to physical structures on the computing device. In this way, a hacker or cyber thief cannot convince an authentication system that the cyber attacker does indeed have the something you have because to do so the attacker must be in physical possession of the computing device.
    Type: Application
    Filed: April 21, 2022
    Publication date: August 4, 2022
    Inventors: Erica Wickstrom Brand, Marius Paul Michiel Schilder, Scott D. Johnson, Vincent Palatin
  • Patent number: 11394704
    Abstract: Techniques and apparatuses are described that enable integrated second factor authentication. These techniques and apparatuses enable the improved security of something you have without the accompanying inconvenience or chance of loss. To do so, a secure physical entity is integrated within a computing device. While this provides the something you have without a need to carry a separate object with you, the something you have also must not be able to be accessed remotely. To prevent remote access physical wires are connected from the secure physical entity to physical structures on the computing device. In this way, a hacker or cyber thief cannot convince an authentication system that the cyber attacker does indeed have the something you have because to do so the attacker must be in physical possession of the computing device.
    Type: Grant
    Filed: May 15, 2019
    Date of Patent: July 19, 2022
    Assignee: Google LLC
    Inventors: Erica Wickstrom Brand, Marius Paul Michiel Schilder, Scott D. Johnson, Vincent Palatin
  • Publication number: 20210398657
    Abstract: To identify relevant action items (that may ultimately be reflected as claims data) for closing an identified gap in care reflected by combinations of disparate claims data records within a claims data store, a task-based interventional system executes rule-based models to determine action items eligible for closing a particular gap in care identified based on criteria associated with one or more programs. The task-based interventional system executes one or more machine-learning models to generate care scores associated with relevant entities associated with the identified gaps in care and generates a task data object comprising data indicative of an action item to close the gap in care together with executable jobs for initiating computer-based workflows to provide data indicative of the gap in care to relevant entities.
    Type: Application
    Filed: June 17, 2020
    Publication date: December 23, 2021
    Inventors: Scott D. Johnson, Mallory B. Van Horn, Michael B. Wentzien
  • Publication number: 20210397718
    Abstract: Systems, apparatuses, and methods for improving security of a silicon-based system by creating a glitch-resistant process for executing a software code block on the silicon-based system are disclosed. An example method may begin by marking the software code block as non-executable. Second, intent to execute the software code block is registered with a staging register. Third, the software code block is compressed into a compression constant. Fourth, the compression constant is compared with a first predetermined value using two comparators. Fifth, responsive to the comparators providing a true result after comparison, the software code block is marked as executable to allow the software code block to execute. In another aspect, the example method may be repeated for n>1 iterations, and in each iteration i, an ith software code block is compressed into an ith compression constant that is compared to an ith predetermined value.
    Type: Application
    Filed: August 31, 2021
    Publication date: December 23, 2021
    Applicant: Google LLC
    Inventors: Marius P. Schilder, Timothy Chen, Scott D. Johnson, Derek L. Martin
  • Patent number: 11157627
    Abstract: Systems, apparatuses, and methods for improving security of a silicon-based system by creating a glitch-resistant process for executing a software code block on the silicon-based system are disclosed. An example method may begin by marking the software code block as non-executable. Second, intent to execute the software code block is registered with a staging register. Third, the software code block is compressed into a compression constant. Fourth, the compression constant is compared with a first predetermined value using two comparators. Fifth, responsive to the comparators providing a true result after comparison, the software code block is marked as executable to allow the software code block to execute. In another aspect, the example method may be repeated for n>1 iterations, and in each iteration i, an ith software code block is compressed into an ith compression constant that is compared to an ith predetermined value.
    Type: Grant
    Filed: February 19, 2018
    Date of Patent: October 26, 2021
    Assignee: Google LLC
    Inventors: Marius P. Schilder, Timothy Chen, Scott D. Johnson, Derek L. Martin
  • Patent number: 11113338
    Abstract: There is a need for solutions that increase efficiency and reliability of medical record processing systems. This need can be addressed, for example, by receiving a free-form primary provider input from a primary provider profile; detecting one or more information deficiencies in the primary provider input, wherein each information deficiency indicates a respective query; for each identified information deficiency of the one or more information deficiencies, identifying a supportive profile associated with the respective information deficiency, causing the supportive profile computing entity associated with the respective supportive provider profile to present an audiovisual interface that includes an indication of the respective query associated with the information deficiency, and receiving a supportive provider input from each supportive provider profile; and generating a collaborative record for the primary provider input based on the primary provider input and each received supportive provider input.
    Type: Grant
    Filed: March 1, 2019
    Date of Patent: September 7, 2021
    Assignee: Optum Services (Ireland) Limited
    Inventors: Raja Mukherji, Dominik Dahlem, Scott D. Johnson, Michael B. Wentzien, Joshua L. Taylor, Thomas R. Gilbertson, Bruno Ohana, Mallory B. Van Horn, David A. Chennisi, Yangcheng Huang
  • Patent number: 10854251
    Abstract: This document describes techniques for authenticating an identity of a semiconductor component using a physical identifier. In some aspects, a physical identifier comprised of a region of features located indiscriminately within a surface of an encapsulated semiconductor component is fabricated. The physical identifier is then mapped. The map is then stored for use when authenticating the identity of the semiconductor component.
    Type: Grant
    Filed: December 15, 2017
    Date of Patent: December 1, 2020
    Assignee: Google LLC
    Inventors: Andy Yang, Scott D. Johnson, Lynn Bos, Neal Mueller
  • Publication number: 20200278999
    Abstract: There is a need for solutions that increase efficiency and reliability of medical record processing systems. This need can be addressed, for example, by receiving a free-form primary provider input from a primary provider profile; detecting one or more information deficiencies in the primary provider input, wherein each information deficiency indicates a respective query; for each identified information deficiency of the one or more information deficiencies, identifying a supportive profile associated with the respective information deficiency, causing the supportive profile computing entity associated with the respective supportive provider profile to present an audiovisual interface that includes an indication of the respective query associated with the information deficiency, and receiving a supportive provider input from each supportive provider profile; and generating a collaborative record for the primary provider input based on the primary provider input and each received supportive provider input.
    Type: Application
    Filed: March 1, 2019
    Publication date: September 3, 2020
    Inventors: Raja Mukherji, Dominik Dahlem, Scott D. Johnson, Michael B. Wentzien, Joshua L. Taylor, Thomas R. Gilbertson, Bruno Ohana, Mallory B. Van Horn, David A. Chennisi, Yangcheng Huang
  • Publication number: 20190306161
    Abstract: Techniques and apparatuses are described that enable integrated second factor authentication. These techniques and apparatuses enable the improved security of something you have without the accompanying inconvenience or chance of loss. To do so, a secure physical entity is integrated within a computing device. While this provides the something you have without a need to carry a separate object with you, the something you have also must not be able to be accessed remotely. To prevent remote access physical wires are connected from the secure physical entity to physical structures on the computing device. In this way, a hacker or cyber thief cannot convince an authentication system that the cyber attacker does indeed have the something you have because to do so the attacker must be in physical possession of the computing device.
    Type: Application
    Filed: May 15, 2019
    Publication date: October 3, 2019
    Inventors: Erica Wickstrom Brand, Marius Paul Michiel Schilder, Scott D. Johnson, Vincent Palatin
  • Publication number: 20190189171
    Abstract: This document describes techniques for authenticating an identity of a semiconductor component using a physical identifier. In some aspects, a physical identifier comprised of a region of features located indiscriminately within a surface of an encapsulated semiconductor component is fabricated. The physical identifier is then mapped. The map is then stored for use when authenticating the identity of the semiconductor component.
    Type: Application
    Filed: December 15, 2017
    Publication date: June 20, 2019
    Applicant: Google LLC
    Inventors: Andy Yang, Scott D. Johnson, Lynn Bos, Neal Mueller
  • Publication number: 20180253557
    Abstract: Systems, apparatuses, and methods for improving security of a silicon-based system by creating a glitch-resistant process for executing a software code block on the silicon-based system are disclosed. An example method may begin by marking the software code block as non-executable. Second, intent to execute the software code block is registered with a staging register. Third, the software code block is compressed into a compression constant. Fourth, the compression constant is compared with a first predetermined value using two comparators. Fifth, responsive to the comparators providing a true result after comparison, the software code block is marked as executable to allow the software code block to execute. In another aspect, the example method may be repeated for n>1 iterations, and in each iteration i, an ith software code block is compressed into an ith compression constant that is compared to an ith predetermined value.
    Type: Application
    Filed: February 19, 2018
    Publication date: September 6, 2018
    Applicant: Google LLC
    Inventors: Marius P. Schilder, Timothy Chen, Scott D. Johnson, Derek L. Martin
  • Publication number: 20180241743
    Abstract: Techniques and apparatuses are described that enable integrated second factor authentication. These techniques and apparatuses enable the improved security of something you have without the accompanying inconvenience or chance of loss. To do so, a secure physical entity is integrated within a computing device. While this provides the something you have without a need to carry a separate object with you, the something you have also must not be able to be accessed remotely. To prevent remote access physical wires are connected from the secure physical entity to physical structures on the computing device. In this way, a hacker or cyber thief cannot convince an authentication system that the cyber attacker does indeed have the something you have because to do so the attacker must be in physical possession of the computing device.
    Type: Application
    Filed: February 21, 2017
    Publication date: August 23, 2018
    Applicant: Google Inc.
    Inventors: Erica Wickstrom Brand, Marius Paul Michiel Schilder, Scott D. Johnson, Vincent Palatin
  • Patent number: 8423978
    Abstract: A method, apparatus, and computer instructions for a configurable JavaServer pages processing framework to process JavaServer pages (JSP). A JSP document or page is translated into a document object model (DOM) object that encapsulates elements of the JSP. The syntax of the JSP is validated by a JSP translator with built-in classes and errors are returned if necessary. A JSP visitor configuration file, which defines user configured classes and sequence of execution, is used by the JSP translator to invoke methods of user-defined classes in the order specified by the user to process or visit elements of the DOM object. Result of user-defined class processing may be passed from one class to another within the set.
    Type: Grant
    Filed: June 22, 2011
    Date of Patent: April 16, 2013
    Assignee: International Business Machines Corporation
    Inventors: Richard A. Backhouse, Scott D. Johnson
  • Patent number: 8341004
    Abstract: The present invention can include a solution that dynamically manages electronic calendar events based upon the key performance indicators (KPIs) of a business process monitoring (BPM) system. Such a system can include a BPM system, an electronic calendar software application, and a dynamic calendar event manager. The BPM system can be configured to manage data for many user-defined KPIs. The electronic calendar software application can be configured to manage the calendar data of various calendar events for many users. The dynamic calendar event definition can be configured to define a condition for modifying the calendar data of a user-specified calendar event. The dynamic calendar event definition can consist of a KPI threshold value, a calendar action, and an applicable attendee list. The dynamic calendar event manager can be configured to dynamically and automatically handle the modification of the calendar data in accordance with the dynamic calendar event definition.
    Type: Grant
    Filed: June 24, 2008
    Date of Patent: December 25, 2012
    Assignee: International Business Machines Corporation
    Inventors: Caroline Cross Daughtrey, Scott D. Johnson, Christopher M. Ketchuck, Stephanie L. Walter, Eric D. Wayne, Yingxin Xing
  • Patent number: 8185610
    Abstract: A method, system, and computer program product for efficiently fulfilling java server page (JSP) requests for dynamic web content, in a computer network system. An asynchronous processing (AP) utility pre-defines a number of custom classes to enable the asynchronous processing of requests. A JSP which contains a custom “async:include” tag indicates an asynchronous request for dynamic content. When a set of asynchronous requests are received by an application server, an “AsyncRequestDispatcher” is called to handle the asynchronous processing of each associated request dispatcher include fragment. For each fragment, a separate request thread is initiated. A placeholder corresponding to each “async:include” request is written to a servlet response buffer. HyperText Markup Language (HTML) content, which includes the placeholders, and a number of javascripts are then written to the client browser. The original thread is closed.
    Type: Grant
    Filed: December 4, 2007
    Date of Patent: May 22, 2012
    Assignee: International Business Machines Corporation
    Inventors: Robert E. Goff, Scott D. Johnson, Erinn E. Koonce, Todd E. Kaplinger, Stephen J. Kenna, Maxim A. Moldenhauer
  • Publication number: 20090319320
    Abstract: The present invention can include a solution that dynamically manages electronic calendar events based upon the key performance indicators (KPIs) of a business process monitoring (BPM) system. Such a system can include a BPM system, an electronic calendar software application, and a dynamic calendar event manager. The BPM system can be configured to manage data for many user-defined KPIs. The electronic calendar software application can be configured to manage the calendar data of various calendar events for many users. The dynamic calendar event definition can be configured to define a condition for modifying the calendar data of a user-specified calendar event. The dynamic calendar event definition can consist of a KPI threshold value, a calendar action, and an applicable attendee list. The dynamic calendar event manager can be configured to dynamically and automatically handle the modification of the calendar data in accordance with the dynamic calendar event definition.
    Type: Application
    Filed: June 24, 2008
    Publication date: December 24, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: CAROLINE CROSS DAUGHTREY, SCOTT D. JOHNSON, CHRISTOPHER M. KETCHUCK, STEPHANIE L. WALTER, ERIC D. WAYNE, YINGXIN XING