Patents by Inventor Thomas A. Bishop
Thomas A. Bishop has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9684791Abstract: A secure secrets proxy is instantiated in a first computing environment and includes secure secrets proxy authentication data for identifying itself to a secrets distribution management system in a second computing environment as a trusted virtual asset to receive and cache secrets data in a secure secrets cache outside the second computing environment. A virtual asset requests one or more secrets, triggering a process to authenticate the requesting virtual asset, gathering authorized secrets data representing secrets the virtual asset is allowed to have. The secure secrets proxy is provided data representing the requested secrets and stores that secrets data in the secure secrets cache of the proxy.Type: GrantFiled: April 20, 2016Date of Patent: June 20, 2017Assignee: Intuit Inc.Inventors: Luis Felipe Cabrera, M. Shannon Lietz, James Armitage, Oleg Gryb, Elangovan Shanmugam, Sabu Kuruvila Philip, Brett Weaver, Thomas Bishop, Troy Otillio, Jinglei Whitehouse, Jeffrey M. Wolfe, Ankur Jain
-
Publication number: 20160371178Abstract: An application is implemented in the production environment in which the application will be used. Fabricated user data associated with the application implemented in the production environment is then generated and provided to the application as implemented in the production environment. The fabricated user data is then processed by the application in the production environment to transform the fabricated user data into fabricated user results data. In one embodiment, the fabricated user results data is then analyzed to evaluate the production environment and/or operation of the application in the production environment.Type: ApplicationFiled: August 31, 2016Publication date: December 22, 2016Applicant: Intuit Inc.Inventors: Thomas Bishop, Javier Godinez, Capen Brinkley, Brett Weaver, M. Shannon Lietz, Luis Felipe Cabrera
-
Publication number: 20160353278Abstract: The disclosure includes a system including media assets and an access system. The media assets include standard media and restricted media. The restricted media is different from the standard media. The access system receives an accessory identifier from a client device communicatively coupled to an accessory associated with the accessory identifier. The access system further authorizes access for the client device to the restricted media based at least in part on the accessory identifier. The standard media is accessible to the client device regardless of the access system receiving the accessory identifier. The restricted media is not accessible to the client device when the access system has not received the accessory identifier.Type: ApplicationFiled: May 26, 2015Publication date: December 1, 2016Inventors: Samuel PASCHEL, Samuel Steele NOERTKER, Thomas BISHOP, Thomas BURTON, Matthew WINDT
-
Patent number: 9459987Abstract: An application is implemented in the production environment in which the application will be used. Two or more backend systems are used to implement different versions of the application using the production environment in which the application will actually be used and accessed. Actual user data is received. A first portion of the actual user data is routed and processed in the production environment using a first version of the application and a first backend system of the two or more backend systems. A second portion of the actual user data is also routed and processed in the production environment but using a second version of the application and a second backend system of the two or more backend systems. The results data is then analyzed to evaluate the various versions of the application in the production environment.Type: GrantFiled: December 11, 2015Date of Patent: October 4, 2016Assignee: Intuit Inc.Inventors: Brett Weaver, Javier Godinez, Capen Brinkley, Thomas Bishop, M. Shannon Lietz, Luis Felipe Cabrera
-
Publication number: 20160234015Abstract: A secure secrets proxy is instantiated in a first computing environment and includes secure secrets proxy authentication data for identifying itself to a secrets distribution management system in a second computing environment as a trusted virtual asset to receive and cache secrets data in a secure secrets cache outside the second computing environment. A virtual asset requests one or more secrets, triggering a process to authenticate the requesting virtual asset, gathering authorized secrets data representing secrets the virtual asset is allowed to have. The secure secrets proxy is provided data representing the requested secrets and stores that secrets data in the secure secrets cache of the proxy.Type: ApplicationFiled: April 20, 2016Publication date: August 11, 2016Applicant: Intuit Inc.Inventors: Luis Felipe Cabrera, M. Shannon Lietz, James Armitage, Oleg Gryb, Elangovan Shanmugam, Sabu Kuruvila Philip, Brett Weaver, Thomas Bishop, Troy Otillio, Jinglei Whitehouse, Jeffrey M. Wolfe, Ankur Jain
-
Patent number: 9390288Abstract: Virtual asset creation data used to create a virtual asset is generated through a virtual asset creation system that includes primary virtual asset data. Secondary authentication data is also generated. When the virtual asset is launched, the secondary authentication data is passed to the virtual asset from the virtual asset creation system. The primary virtual asset data and secondary authentication data from the virtual asset creation system and the virtual asset, and/or one or more other sources associated with the virtual asset, are then sent to a virtual asset validation system through different communication channels. If the primary virtual asset data and secondary authentication data from the two sources match, or have a defined threshold level of similarity, the status of the virtual asset is transformed to the status of validated virtual asset eligible to receive sensitive data.Type: GrantFiled: November 1, 2013Date of Patent: July 12, 2016Assignee: Intuit Inc.Inventors: Oleg Gryb, Jinglei Whitehouse, Elangovan Shanmugam, Ankur Jain, III, Mark Basler, M. Shannon Lietz, Sabu Kuruvila Philip, Luis Felipe Cabrera, Thomas Bishop
-
Publication number: 20160196758Abstract: Presented are systems and methods that analyze an individual's state based on selected criteria, and then adaptively provide stimuli to affect the individual's performance compared to established benchmarks and pre-set plans. The methods or systems can provide audio and/or tactile inputs to a human subject to obtain a specific performance state. A music or sound selection engine considers the sensory and environmental inputs and selects the appropriate music or auditory stimulus at 14, with the intent to reach desired state of flow. The methods an systems can employ multiple measurements of personal data that can correlate to the emotional state of a subject. By manipulating stimuli delivered to an individual, ultimate performance can be improved over various planning horizons.Type: ApplicationFiled: January 5, 2016Publication date: July 7, 2016Applicant: Skullcandy, Inc.Inventors: Elvir Causevic, Eldar Causevic, Ines Kusturica, Samuel R. Paschel, S. Hoby Darling, Emily Cook, Samuel Noertiker, Kristopher C. Fike, Thomas C. Burton, Matthew Windt, Thomas Bishop
-
Patent number: 9384362Abstract: Secrets data representing one or more secrets required to access associated resources is provided along with secrets distribution policy data representing one or more secrets distribution factors used to control the distribution of the secrets. When a requesting virtual asset submits secrets request data, virtual asset profile data associated with the requesting virtual asset is obtained. The requesting virtual asset profile data is then analyzed using at least one of the secrets distribution factors to authenticate the requesting virtual asset. The requesting virtual asset profile data is then analyzed using one or more of secrets distribution factors to determine what secrets the requesting virtual asset legitimately needs. Authorized secrets data for the requesting virtual asset representing one or more authorized secrets is then generated. The requesting virtual asset is then provided access to the authorized secrets data.Type: GrantFiled: October 14, 2013Date of Patent: July 5, 2016Assignee: Intuit Inc.Inventors: Luis Felipe Cabrera, M. Shannon Lietz, James Armitage, Oleg Gryb, Elangovan Shanmugam, Sabu Kuruvila Philip, Brett Weaver, Thomas Bishop, Troy Otillio, Jinglei Whitehouse, Jeffrey M. Wolfe, Ankur Jain
-
Patent number: 9374389Abstract: Asset security compliance data ensuring defined asset security policies are applied to the creation and/or operation of assets to be used to implement an application and application deployment security compliance data for ensuring compliance with one or more application deployment security policies associated with the deployment of assets used to implement the application is generated. The asset security compliance data is then used to ensure each asset used to implement the application is created and used in compliance with asset security policies and the application deployment security compliance data is used to ensure that each asset used to implement the application is deployed in compliance with the application deployment security policies.Type: GrantFiled: April 25, 2014Date of Patent: June 21, 2016Assignee: Intuit Inc.Inventors: Thomas Bishop, Brett Weaver, Christian Price, Javier Godinez, Capen Brinkley, M. Shannon Lietz, Luis Felipe Cabrera
-
Publication number: 20160098340Abstract: An application is implemented in the production environment in which the application will be used. Two or more backend systems are used to implement different versions of the application using the production environment in which the application will actually be used and accessed. Actual user data is received. A first portion of the actual user data is routed and processed in the production environment using a first version of the application and a first backend system of the two or more backend systems. A second portion of the actual user data is also routed and processed in the production environment but using a second version of the application and a second backend system of the two or more backend systems. The results data is then analyzed to evaluate the various versions of the application in the production environment.Type: ApplicationFiled: December 11, 2015Publication date: April 7, 2016Applicant: Intuit Inc.Inventors: Brett Weaver, Javier Godinez, Capen Brinkley, Thomas Bishop, M. Shannon Lietz, Luis Felipe Cabrera
-
Patent number: 9245117Abstract: An application is implemented in the production environment in which the application will be used. Two or more backend systems are used to implement different versions of the application using the production environment in which the application will actually be used and accessed. Actual user data is received. A first portion of the actual user data is routed and processed in the production environment using a first version of the application and a first backend system of the two or more backend systems. A second portion of the actual user data is also routed and processed in the production environment but using a second version of the application and a second backend system of the two or more backend systems. The results data is then analyzed to evaluate the various versions of the application in the production environment.Type: GrantFiled: March 31, 2014Date of Patent: January 26, 2016Assignee: Intuit Inc.Inventors: Brett Weaver, Javier Godinez, Capen Brinkley, Thomas Bishop, M. Shannon Lietz, Luis Felipe Cabrera
-
Publication number: 20150381651Abstract: A method and system for protecting and repairing a current virtual asset from damage by potential security threats, according to one embodiment. The method and system include monitoring a current a current virtual asset for potential security threats, with a virtual asset agent, according to one embodiment. The method and system include determining a severity of the potential security threats that are identified by the virtual asset agent, according to one embodiment. The method and system include creating a new virtual asset with the virtual asset agent and decommissioning the current virtual asset, according to one embodiment. The system and method receiving, with the new virtual asset, secrets that are associated with the current virtual asset to enable the new virtual asset to continue operations of the current virtual asset, according to one embodiment.Type: ApplicationFiled: June 30, 2014Publication date: December 31, 2015Applicant: INTUIT INC.Inventors: M. Shannon Lietz, Luis Felipe Cabrera, Thomas Bishop, Brett Weaver, Capen Brinkley
-
Publication number: 20150312274Abstract: Asset security compliance data ensuring defined asset security policies are applied to the creation and/or operation of assets to be used to implement an application and application deployment security compliance data for ensuring compliance with one or more application deployment security policies associated with the deployment of assets used to implement the application is generated. The asset security compliance data is then used to ensure each asset used to implement the application is created and used in compliance with asset security policies and the application deployment security compliance data is used to ensure that each asset used to implement the application is deployed in compliance with the application deployment security policies.Type: ApplicationFiled: April 25, 2014Publication date: October 29, 2015Applicant: INTUIT INC.Inventors: Thomas Bishop, Brett Weaver, Christian Price, Javier Godinez, Capen Brinkley, M. Shannon Lietz, Luis Felipe Cabrera
-
Publication number: 20150278517Abstract: An application is implemented in the production environment in which the application will be used. Two or more backend systems are used to implement different versions of the application using the production environment in which the application will actually be used and accessed. Actual user data is received. A first portion of the actual user data is routed and processed in the production environment using a first version of the application and a first backend system of the two or more backend systems. A second portion of the actual user data is also routed and processed in the production environment but using a second version of the application and a second backend system of the two or more backend systems. The results data is then analyzed to evaluate the various versions of the application in the production environment.Type: ApplicationFiled: March 31, 2014Publication date: October 1, 2015Applicant: Intuit Inc.Inventors: Brett Weaver, Javier Godinez, Capen Brinkley, Thomas Bishop, M. Shannon Lietz, Luis Felipe Cabrera
-
Publication number: 20150278523Abstract: An application is implemented in the production environment in which the application will be used. Two or more backend systems are provided. Actual user data is received. The actual user data is routed and processed in the production environment using a first backend system of the two or more backend systems. Fabricated user data is generated, routed, and also processed in the production environment but using a second backend system of the two or more backend systems. Results data from the processing of the fabricated user data is then analyzed to evaluate the production environment and/or operation of the application in the production environment.Type: ApplicationFiled: March 31, 2014Publication date: October 1, 2015Applicant: Intuit Inc.Inventors: Capen Brinkley, Javier Godinez, Thomas Bishop, Brett Weaver, M. Shannon Lietz, Luis Felipe Cabrera
-
Publication number: 20150269064Abstract: An application is implemented in the production environment in which the application will be used. Fabricated user data associated with the application implemented in the production environment is then generated and provided to the application as implemented in the production environment. The fabricated user data is then processed by the application in the production environment to transform the fabricated user data into fabricated user results data. In one embodiment, the fabricated user results data is then analyzed to evaluate the production environment and/or operation of the application in the production environment.Type: ApplicationFiled: March 21, 2014Publication date: September 24, 2015Applicant: INTUIT INC.Inventors: Thomas Bishop, Javier Godinez, Capen Brinkley, Brett Weaver, M. Shannon Lietz, Luis Felipe Cabrera
-
Publication number: 20150128295Abstract: Virtual asset creation data used to create a virtual asset is generated through a virtual asset creation system that includes primary virtual asset data. Secondary authentication data is also generated. When the virtual asset is launched, the secondary authentication data is passed to the virtual asset from the virtual asset creation system. The primary virtual asset data and secondary authentication data from the virtual asset creation system and the virtual asset, and/or one or more other sources associated with the virtual asset, are then sent to a virtual asset validation system through different communication channels. If the primary virtual asset data and secondary authentication data from the two sources match, or have a defined threshold level of similarity, the status of the virtual asset is transformed to the status of validated virtual asset eligible to receive sensitive data.Type: ApplicationFiled: November 1, 2013Publication date: May 7, 2015Applicant: Intuit Inc.Inventors: Oleg Gryb, Jinglei Whitehouse, Elangovan Shanmugam, Ankur Jain, Mark Basler, M. Shannon Lietz, Sabu Kuruvila Philip, Luis Felipe Cabrera, Thomas Bishop
-
Publication number: 20150106869Abstract: Secrets data representing one or more secrets required to access associated resources is provided along with secrets distribution policy data representing one or more secrets distribution factors used to control the distribution of the secrets. When a requesting virtual asset submits secrets request data, virtual asset profile data associated with the requesting virtual asset is obtained. The requesting virtual asset profile data is then analyzed using at least one of the secrets distribution factors to authenticate the requesting virtual asset. The requesting virtual asset profile data is then analyzed using one or more of secrets distribution factors to determine what secrets the requesting virtual asset legitimately needs. Authorized secrets data for the requesting virtual asset representing one or more authorized secrets is then generated. The requesting virtual asset is then provided access to the authorized secrets data.Type: ApplicationFiled: October 14, 2013Publication date: April 16, 2015Applicant: Intuit Inc.Inventors: Luis Felipe Cabrera, M. Shannon Lietz, James Armitage, Oleg Gryb, Elangovan Shanmugam, Sabu Kuruvila Philip, Brett Weaver, Thomas Bishop, Troy Otillio, Jinglei Whitehouse, Jeffrey M. Wolfe, Ankur Jain
-
Publication number: 20140270254Abstract: The disclosure includes a system and method for sonically customizing an audio reproduction device. The system includes a processor and a memory storing instructions that when executed cause the system to: determine an application environment associated with an audio reproduction device associated with a user; determine one or more sound profiles based on the application environment; provide the one or more sound profiles to the user; receive a selection of a first sound profile from the one or more sound profiles; and generate tuning data based on the first sound profile, the tuning data configured to sonically customize the audio reproduction device.Type: ApplicationFiled: March 13, 2014Publication date: September 18, 2014Applicant: Skullcandy, Inc.Inventors: Tetsuro OISHI, Rex PRICE, Samuel PASCHEL, Matthew WINDT, Thomas BISHOP
-
Patent number: 7651835Abstract: The invention provides, in various embodiments, systems, devices and methods relating to ex-vivo organ care. In certain embodiments, the invention relates to maintaining an organ ex-vivo at near-physiologic conditions.Type: GrantFiled: October 7, 2005Date of Patent: January 26, 2010Assignee: TransMedics, Inc.Inventors: Waleed Hassanein, Richard Bringham, Giovanni Cecere, Robert Fishman, Larry Goff, Tamer Khayal, Stanley Kyi, Burt Ochs, Scott Newell, Ronald Taylor, Hossam Algamil, Thomas Bishop, Robert Havner, Dmitri Menn