Patents by Inventor Thomas Clay
Thomas Clay has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11978880Abstract: A method for forming a layered anode material includes contacting a precursor material and a first electrolyte. The precursor material is a layered ionic compound represented by MX2, where M is one of calcium and magnesium and X is one of silicon, germanium, and boron. The method further includes applying a first bias and/or current as the precursor material contacts the first electrolyte to remove cations from the precursor material to create a two-dimensional structure that defines the layered anode material. In certain variations, the method further includes contacting the two-dimensional structure and a second electrolyte and applying a second bias and/or current as the two-dimensional structure contacts the second electrolyte so as to cause lithium ions to move into interlayer spaces or voids created in the two-dimensional structure by the removal of the cations thereby forming the layered anode material.Type: GrantFiled: June 1, 2021Date of Patent: May 7, 2024Assignee: GM GLOBAL TECHNOLOGY OPERATIONS LLCInventors: Jeffrey David Cain, Thomas E. Moylan, Leng Mao, Paul Taichiang Yu, Nicholas Paul William Pieczonka, Andrew Clay Bobel
-
Publication number: 20240136534Abstract: An electrode assembly includes a current collector, a lithium metal foil, and an alloyed interface that chemically binds the current collector and the lithium metal foil. In certain variations, the alloyed interface includes an intermediate layer disposed between the current collector and the lithium metal foil, a portion of the current collector adjacent to the intermediate layer is alloyed with the indium, gallium, or alloy of indium and gallium defining the intermediate layer, and a portion of the lithium metal foil adjacent to the intermediate layer is alloyed with the indium, gallium, or alloy of indium and gallium defining the intermediate layer. In other variations, the alloyed interface includes a copper-lithium alloy.Type: ApplicationFiled: October 20, 2022Publication date: April 25, 2024Applicant: GM GLOBAL TECHNOLOGY OPERATIONS LLCInventors: Diptak BHATTACHARYA, Caleb REESE, Thomas E. MOYLAN, Andrew Clay BOBEL, Anil K. SACHDEV
-
Publication number: 20200193400Abstract: A method may include receiving an approval request from a payment system including a purchase amount of the transaction and a time limit. The method may include obtaining a current value of securities. The method may include determining a purchase amount limit based on the current value. Responsive to the purchase amount being less than or equal to the purchase amount limit, the method may include obtaining margin loan funds equal to the purchase amount. The method may include sending the margin loan funds to the payment system. The payment system may approve the financial transaction prior to the time limit expiring responsive to receiving the margin loan funds. The method may include instructing the record keeper to have a broker sell at least a portion of the securities to attain sale funds. The method may include obtaining the sale funds and settling the margin loan using the sale funds.Type: ApplicationFiled: December 18, 2019Publication date: June 18, 2020Inventor: Thomas Clay Wilkes
-
Patent number: 10482037Abstract: A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.Type: GrantFiled: November 29, 2018Date of Patent: November 19, 2019Assignee: Georgetown UniversityInventor: Thomas Clay Shields
-
Patent number: 10336206Abstract: Systems, methods, and other embodiments associated with identifying a user of a charging station. According to one embodiment, a system includes a communication logic and an authorization logic. The communication logic aggregates transaction data to an authorizing entity. The transaction data is associated with a user and a chargeable vehicle. The authorization logic receives an authorization request to authorize a transaction between the chargeable vehicle and the charging station. The authorization logic sends a response to the authorization request. The communication also enables the chargeable vehicle to receive a charge from the charging station based on the response to the authorization request.Type: GrantFiled: June 24, 2015Date of Patent: July 2, 2019Assignees: HONDA MOTOR CO., LTD., IBM CORPORATIONInventors: Robert Uyeki, Charles Bradford Vincent, Xiao Song Ran, David Wong Cun, Richard Asato, Thomas Clay Luthy
-
Publication number: 20190108141Abstract: A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.Type: ApplicationFiled: November 29, 2018Publication date: April 11, 2019Applicant: Georgetown UniversityInventor: Thomas Clay Shields
-
Patent number: 10146705Abstract: A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.Type: GrantFiled: October 27, 2016Date of Patent: December 4, 2018Assignee: Georgetown UniversityInventor: Thomas Clay Shields
-
Publication number: 20170147510Abstract: A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.Type: ApplicationFiled: October 27, 2016Publication date: May 25, 2017Applicant: Georgetown UniversityInventor: Thomas Clay Shields
-
Publication number: 20170030064Abstract: This invention relates to control of obnoxious odors from toilet bowl by fogging nozzles. This is accomplished by mounting fogging nozzles on an independent insert installed under the toilet seat on common mounting holes. Fogging nozzles are fed from the household water supply at 40-60 PSI. This is achieved by bifurcating water supply to the toilet tank or such water sources available in the bathroom. A control valve is used to control water supply and regulate water pressure to the fogging nozzles. Nozzles are directed to produce atomizing fog to fill the volume of the toilet bowl to capture and absorb air born odor molecules and drop into the pool of water in the bowl. Eventually the odor laden water is flushed at the end of cleaning cycle.Type: ApplicationFiled: June 26, 2016Publication date: February 2, 2017Inventor: Thomas Clay Spencer
-
Publication number: 20160375783Abstract: Systems, methods, and other embodiments associated with identifying a user of a charging station. According to one embodiment, a system includes a communication logic and an authorization logic. The communication logic aggregates transaction data to an authorizing entity. The transaction data is associated with a user and a chargeable vehicle. The authorization logic receives an authorization request to authorize a transaction between the chargeable vehicle and the charging station. The authorization logic sends a response to the authorization request. The communication also enables the chargeable vehicle to receive a charge from the charging station based on the response to the authorization request.Type: ApplicationFiled: June 24, 2015Publication date: December 29, 2016Inventors: Robert Uyeki, Charles Bradford Vincent, Xiao Song Ran, David Wong Cun, Richard Asato, Thomas Clay Luthy
-
Patent number: 9483640Abstract: A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.Type: GrantFiled: April 1, 2014Date of Patent: November 1, 2016Assignee: Georgetown UniversityInventor: Thomas Clay Shields
-
Publication number: 20150281273Abstract: A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.Type: ApplicationFiled: April 1, 2014Publication date: October 1, 2015Applicant: GEORGETOWN UNIVERSITYInventor: Thomas Clay SHIELDS
-
Patent number: 8438174Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Forensic signatures are created including a digital fingerprint and other information associated with a file. In one aspect, informational signatures are created, which may assist in determining what information is included in a file. In another aspect, the digital fingerprint may represent contents of the file and is resistant to minor modification of the file. In another aspect, fingerprints can be compared in parallel on different computers.Type: GrantFiled: June 24, 2010Date of Patent: May 7, 2013Assignee: Georgetown UniversityInventors: Thomas Clay Shields, Ophir Frieder, Marcus A. Maloof
-
Patent number: 8312023Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Digital representations are generated proactively for a specified target. A digital representation is a digest of the content of the target. Digital representations of a collection of targets indexed and organized in a data structure, such as an inverted index. The searching and comparison of digital representations of a collection of targets allows quick and accurate identification of targets having identical or similar content. Computational and storage costs are expended in advance, which allows more efficient computer forensic investigations. The present invention can be applied to numerous applications, such as computer forensic evidence gathering, misuse detection, network intrusion detection, and unauthorized network traffic detection and prevention.Type: GrantFiled: May 12, 2008Date of Patent: November 13, 2012Assignee: Georgetown UniversityInventors: Thomas Clay Shields, Ophir Frieder, Marcus A. Maloof
-
Patent number: 8280905Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Digital signatures are generated proactively for a specified target. The digital signature represents a digest of the content of the target, and can be readily stored. Searching and comparing digital signatures allows quick and accurate identification of targets having identical or similar content. Computational and storage costs are expended in advance, which allow more efficient computer forensic investigations. The present invention can be applied to numerous applications, such as computer forensic evidence gathering, misuse detection, network intrusion detection, and unauthorized network traffic detection and prevention.Type: GrantFiled: December 21, 2007Date of Patent: October 2, 2012Assignee: Georgetown UniversityInventors: Thomas Clay Shields, Ophir Frieder, Marcus A. Maloof
-
Patent number: 8096731Abstract: A connection assembly for connecting sub-sea lines and devices includes a stab receptacle assembly and a stab assembly. The stab receptacle assembly includes a receptacle body and an outlet assembly, which in turn, includes an adapter nipple configured for attachment to the first sub-sea line. A swivel flange secures the adapter nipple to the first side of the receptacle body. The use of the adapter nipple and swivel flange eliminates a difficult weld between the adapter nipple and the receptacle body. The connection assembly further includes a stab assembly that has a base, a line end connected to the base and a stab body connected to the base. The stab body is configured for insertion into the stab receptacle. The line end is configured for connection to the second sub-sea line.Type: GrantFiled: February 3, 2010Date of Patent: January 17, 2012Inventors: Britton F. Piper, Thomas Clay, Barrett Hartman
-
Publication number: 20100287196Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Forensic signatures are created including a digital fingerprint and other information associated with a file. In one aspect, informational signatures are created, which may assist in determining what information is included in a file. In another aspect, the digital fingerprint may represent contents of the file and is resistant to minor modification of the file. In another aspect, fingerprints can be compared in parallel on different computers.Type: ApplicationFiled: June 24, 2010Publication date: November 11, 2010Inventors: Thomas Clay SHIELDS, Ophir Frieder, Marcus A. Maloof
-
Publication number: 20100209198Abstract: A connection assembly for connecting sub-sea lines and devices includes a stab receptacle assembly and a stab assembly. The stab receptacle assembly includes a receptacle body and an outlet assembly, which in turn, includes an adapter nipple configured for attachment to the first sub-sea line. A swivel flange secures the adapter nipple to the first side of the receptacle body. The use of the adapter nipple and swivel flange eliminates a difficult weld between the adapter nipple and the receptacle body. The connection assembly further includes a stab assembly that has a base, a line end connected to the base and a stab body connected to the base. The stab body is configured for insertion into the stab receptacle. The line end is configured for connection to the second sub-sea line.Type: ApplicationFiled: February 3, 2010Publication date: August 19, 2010Applicant: PIPER VALVE SYSTEMS, LTD. CO.Inventors: Britton F. Piper, Thomas Clay, Barrett Hartman
-
Publication number: 20090164517Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Digital signatures are generated proactively for a specified target. The digital signature represents a digest of the content of the target, and can be readily stored. Searching and comparing digital signatures allows quick and accurate identification of targets having identical or similar content. Computational and storage costs are expended in advance, which allow more efficient computer forensic investigations. The present invention can be applied to numerous applications, such as computer forensic evidence gathering, misuse detection, network intrusion detection, and unauthorized network traffic detection and prevention.Type: ApplicationFiled: December 21, 2007Publication date: June 25, 2009Inventors: Thomas Clay SHIELDS, Ophir Frieder, Marcus A. Maloof
-
Publication number: 20090164427Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Digital representations are generated proactively for a specified target. A digital representation is a digest of the content of the target. Digital representations of a collection of targets indexed and organized in a data structure, such as an inverted index. The searching and comparison of digital representations of a collection of targets allows quick and accurate identification of targets having identical or similar content. Computational and storage costs are expended in advance, which allows more efficient computer forensic investigations. The present invention can be applied to numerous applications, such as computer forensic evidence gathering, misuse detection, network intrusion detection, and unauthorized network traffic detection and prevention.Type: ApplicationFiled: May 12, 2008Publication date: June 25, 2009Inventors: Thomas Clay Shields, Ophir Frieder, Marcus A. Maloof