Patents by Inventor Thomas Clay

Thomas Clay has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11978880
    Abstract: A method for forming a layered anode material includes contacting a precursor material and a first electrolyte. The precursor material is a layered ionic compound represented by MX2, where M is one of calcium and magnesium and X is one of silicon, germanium, and boron. The method further includes applying a first bias and/or current as the precursor material contacts the first electrolyte to remove cations from the precursor material to create a two-dimensional structure that defines the layered anode material. In certain variations, the method further includes contacting the two-dimensional structure and a second electrolyte and applying a second bias and/or current as the two-dimensional structure contacts the second electrolyte so as to cause lithium ions to move into interlayer spaces or voids created in the two-dimensional structure by the removal of the cations thereby forming the layered anode material.
    Type: Grant
    Filed: June 1, 2021
    Date of Patent: May 7, 2024
    Assignee: GM GLOBAL TECHNOLOGY OPERATIONS LLC
    Inventors: Jeffrey David Cain, Thomas E. Moylan, Leng Mao, Paul Taichiang Yu, Nicholas Paul William Pieczonka, Andrew Clay Bobel
  • Publication number: 20240136534
    Abstract: An electrode assembly includes a current collector, a lithium metal foil, and an alloyed interface that chemically binds the current collector and the lithium metal foil. In certain variations, the alloyed interface includes an intermediate layer disposed between the current collector and the lithium metal foil, a portion of the current collector adjacent to the intermediate layer is alloyed with the indium, gallium, or alloy of indium and gallium defining the intermediate layer, and a portion of the lithium metal foil adjacent to the intermediate layer is alloyed with the indium, gallium, or alloy of indium and gallium defining the intermediate layer. In other variations, the alloyed interface includes a copper-lithium alloy.
    Type: Application
    Filed: October 20, 2022
    Publication date: April 25, 2024
    Applicant: GM GLOBAL TECHNOLOGY OPERATIONS LLC
    Inventors: Diptak BHATTACHARYA, Caleb REESE, Thomas E. MOYLAN, Andrew Clay BOBEL, Anil K. SACHDEV
  • Publication number: 20200193400
    Abstract: A method may include receiving an approval request from a payment system including a purchase amount of the transaction and a time limit. The method may include obtaining a current value of securities. The method may include determining a purchase amount limit based on the current value. Responsive to the purchase amount being less than or equal to the purchase amount limit, the method may include obtaining margin loan funds equal to the purchase amount. The method may include sending the margin loan funds to the payment system. The payment system may approve the financial transaction prior to the time limit expiring responsive to receiving the margin loan funds. The method may include instructing the record keeper to have a broker sell at least a portion of the securities to attain sale funds. The method may include obtaining the sale funds and settling the margin loan using the sale funds.
    Type: Application
    Filed: December 18, 2019
    Publication date: June 18, 2020
    Inventor: Thomas Clay Wilkes
  • Patent number: 10482037
    Abstract: A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.
    Type: Grant
    Filed: November 29, 2018
    Date of Patent: November 19, 2019
    Assignee: Georgetown University
    Inventor: Thomas Clay Shields
  • Patent number: 10336206
    Abstract: Systems, methods, and other embodiments associated with identifying a user of a charging station. According to one embodiment, a system includes a communication logic and an authorization logic. The communication logic aggregates transaction data to an authorizing entity. The transaction data is associated with a user and a chargeable vehicle. The authorization logic receives an authorization request to authorize a transaction between the chargeable vehicle and the charging station. The authorization logic sends a response to the authorization request. The communication also enables the chargeable vehicle to receive a charge from the charging station based on the response to the authorization request.
    Type: Grant
    Filed: June 24, 2015
    Date of Patent: July 2, 2019
    Assignees: HONDA MOTOR CO., LTD., IBM CORPORATION
    Inventors: Robert Uyeki, Charles Bradford Vincent, Xiao Song Ran, David Wong Cun, Richard Asato, Thomas Clay Luthy
  • Publication number: 20190108141
    Abstract: A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.
    Type: Application
    Filed: November 29, 2018
    Publication date: April 11, 2019
    Applicant: Georgetown University
    Inventor: Thomas Clay Shields
  • Patent number: 10146705
    Abstract: A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.
    Type: Grant
    Filed: October 27, 2016
    Date of Patent: December 4, 2018
    Assignee: Georgetown University
    Inventor: Thomas Clay Shields
  • Publication number: 20170147510
    Abstract: A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.
    Type: Application
    Filed: October 27, 2016
    Publication date: May 25, 2017
    Applicant: Georgetown University
    Inventor: Thomas Clay Shields
  • Publication number: 20170030064
    Abstract: This invention relates to control of obnoxious odors from toilet bowl by fogging nozzles. This is accomplished by mounting fogging nozzles on an independent insert installed under the toilet seat on common mounting holes. Fogging nozzles are fed from the household water supply at 40-60 PSI. This is achieved by bifurcating water supply to the toilet tank or such water sources available in the bathroom. A control valve is used to control water supply and regulate water pressure to the fogging nozzles. Nozzles are directed to produce atomizing fog to fill the volume of the toilet bowl to capture and absorb air born odor molecules and drop into the pool of water in the bowl. Eventually the odor laden water is flushed at the end of cleaning cycle.
    Type: Application
    Filed: June 26, 2016
    Publication date: February 2, 2017
    Inventor: Thomas Clay Spencer
  • Publication number: 20160375783
    Abstract: Systems, methods, and other embodiments associated with identifying a user of a charging station. According to one embodiment, a system includes a communication logic and an authorization logic. The communication logic aggregates transaction data to an authorizing entity. The transaction data is associated with a user and a chargeable vehicle. The authorization logic receives an authorization request to authorize a transaction between the chargeable vehicle and the charging station. The authorization logic sends a response to the authorization request. The communication also enables the chargeable vehicle to receive a charge from the charging station based on the response to the authorization request.
    Type: Application
    Filed: June 24, 2015
    Publication date: December 29, 2016
    Inventors: Robert Uyeki, Charles Bradford Vincent, Xiao Song Ran, David Wong Cun, Richard Asato, Thomas Clay Luthy
  • Patent number: 9483640
    Abstract: A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.
    Type: Grant
    Filed: April 1, 2014
    Date of Patent: November 1, 2016
    Assignee: Georgetown University
    Inventor: Thomas Clay Shields
  • Publication number: 20150281273
    Abstract: A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.
    Type: Application
    Filed: April 1, 2014
    Publication date: October 1, 2015
    Applicant: GEORGETOWN UNIVERSITY
    Inventor: Thomas Clay SHIELDS
  • Patent number: 8438174
    Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Forensic signatures are created including a digital fingerprint and other information associated with a file. In one aspect, informational signatures are created, which may assist in determining what information is included in a file. In another aspect, the digital fingerprint may represent contents of the file and is resistant to minor modification of the file. In another aspect, fingerprints can be compared in parallel on different computers.
    Type: Grant
    Filed: June 24, 2010
    Date of Patent: May 7, 2013
    Assignee: Georgetown University
    Inventors: Thomas Clay Shields, Ophir Frieder, Marcus A. Maloof
  • Patent number: 8312023
    Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Digital representations are generated proactively for a specified target. A digital representation is a digest of the content of the target. Digital representations of a collection of targets indexed and organized in a data structure, such as an inverted index. The searching and comparison of digital representations of a collection of targets allows quick and accurate identification of targets having identical or similar content. Computational and storage costs are expended in advance, which allows more efficient computer forensic investigations. The present invention can be applied to numerous applications, such as computer forensic evidence gathering, misuse detection, network intrusion detection, and unauthorized network traffic detection and prevention.
    Type: Grant
    Filed: May 12, 2008
    Date of Patent: November 13, 2012
    Assignee: Georgetown University
    Inventors: Thomas Clay Shields, Ophir Frieder, Marcus A. Maloof
  • Patent number: 8280905
    Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Digital signatures are generated proactively for a specified target. The digital signature represents a digest of the content of the target, and can be readily stored. Searching and comparing digital signatures allows quick and accurate identification of targets having identical or similar content. Computational and storage costs are expended in advance, which allow more efficient computer forensic investigations. The present invention can be applied to numerous applications, such as computer forensic evidence gathering, misuse detection, network intrusion detection, and unauthorized network traffic detection and prevention.
    Type: Grant
    Filed: December 21, 2007
    Date of Patent: October 2, 2012
    Assignee: Georgetown University
    Inventors: Thomas Clay Shields, Ophir Frieder, Marcus A. Maloof
  • Patent number: 8096731
    Abstract: A connection assembly for connecting sub-sea lines and devices includes a stab receptacle assembly and a stab assembly. The stab receptacle assembly includes a receptacle body and an outlet assembly, which in turn, includes an adapter nipple configured for attachment to the first sub-sea line. A swivel flange secures the adapter nipple to the first side of the receptacle body. The use of the adapter nipple and swivel flange eliminates a difficult weld between the adapter nipple and the receptacle body. The connection assembly further includes a stab assembly that has a base, a line end connected to the base and a stab body connected to the base. The stab body is configured for insertion into the stab receptacle. The line end is configured for connection to the second sub-sea line.
    Type: Grant
    Filed: February 3, 2010
    Date of Patent: January 17, 2012
    Inventors: Britton F. Piper, Thomas Clay, Barrett Hartman
  • Publication number: 20100287196
    Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Forensic signatures are created including a digital fingerprint and other information associated with a file. In one aspect, informational signatures are created, which may assist in determining what information is included in a file. In another aspect, the digital fingerprint may represent contents of the file and is resistant to minor modification of the file. In another aspect, fingerprints can be compared in parallel on different computers.
    Type: Application
    Filed: June 24, 2010
    Publication date: November 11, 2010
    Inventors: Thomas Clay SHIELDS, Ophir Frieder, Marcus A. Maloof
  • Publication number: 20100209198
    Abstract: A connection assembly for connecting sub-sea lines and devices includes a stab receptacle assembly and a stab assembly. The stab receptacle assembly includes a receptacle body and an outlet assembly, which in turn, includes an adapter nipple configured for attachment to the first sub-sea line. A swivel flange secures the adapter nipple to the first side of the receptacle body. The use of the adapter nipple and swivel flange eliminates a difficult weld between the adapter nipple and the receptacle body. The connection assembly further includes a stab assembly that has a base, a line end connected to the base and a stab body connected to the base. The stab body is configured for insertion into the stab receptacle. The line end is configured for connection to the second sub-sea line.
    Type: Application
    Filed: February 3, 2010
    Publication date: August 19, 2010
    Applicant: PIPER VALVE SYSTEMS, LTD. CO.
    Inventors: Britton F. Piper, Thomas Clay, Barrett Hartman
  • Publication number: 20090164517
    Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Digital signatures are generated proactively for a specified target. The digital signature represents a digest of the content of the target, and can be readily stored. Searching and comparing digital signatures allows quick and accurate identification of targets having identical or similar content. Computational and storage costs are expended in advance, which allow more efficient computer forensic investigations. The present invention can be applied to numerous applications, such as computer forensic evidence gathering, misuse detection, network intrusion detection, and unauthorized network traffic detection and prevention.
    Type: Application
    Filed: December 21, 2007
    Publication date: June 25, 2009
    Inventors: Thomas Clay SHIELDS, Ophir Frieder, Marcus A. Maloof
  • Publication number: 20090164427
    Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Digital representations are generated proactively for a specified target. A digital representation is a digest of the content of the target. Digital representations of a collection of targets indexed and organized in a data structure, such as an inverted index. The searching and comparison of digital representations of a collection of targets allows quick and accurate identification of targets having identical or similar content. Computational and storage costs are expended in advance, which allows more efficient computer forensic investigations. The present invention can be applied to numerous applications, such as computer forensic evidence gathering, misuse detection, network intrusion detection, and unauthorized network traffic detection and prevention.
    Type: Application
    Filed: May 12, 2008
    Publication date: June 25, 2009
    Inventors: Thomas Clay Shields, Ophir Frieder, Marcus A. Maloof