Patents by Inventor Thomas Clay
Thomas Clay has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200193400Abstract: A method may include receiving an approval request from a payment system including a purchase amount of the transaction and a time limit. The method may include obtaining a current value of securities. The method may include determining a purchase amount limit based on the current value. Responsive to the purchase amount being less than or equal to the purchase amount limit, the method may include obtaining margin loan funds equal to the purchase amount. The method may include sending the margin loan funds to the payment system. The payment system may approve the financial transaction prior to the time limit expiring responsive to receiving the margin loan funds. The method may include instructing the record keeper to have a broker sell at least a portion of the securities to attain sale funds. The method may include obtaining the sale funds and settling the margin loan using the sale funds.Type: ApplicationFiled: December 18, 2019Publication date: June 18, 2020Inventor: Thomas Clay Wilkes
-
Patent number: 10482037Abstract: A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.Type: GrantFiled: November 29, 2018Date of Patent: November 19, 2019Assignee: Georgetown UniversityInventor: Thomas Clay Shields
-
Patent number: 10336206Abstract: Systems, methods, and other embodiments associated with identifying a user of a charging station. According to one embodiment, a system includes a communication logic and an authorization logic. The communication logic aggregates transaction data to an authorizing entity. The transaction data is associated with a user and a chargeable vehicle. The authorization logic receives an authorization request to authorize a transaction between the chargeable vehicle and the charging station. The authorization logic sends a response to the authorization request. The communication also enables the chargeable vehicle to receive a charge from the charging station based on the response to the authorization request.Type: GrantFiled: June 24, 2015Date of Patent: July 2, 2019Assignees: HONDA MOTOR CO., LTD., IBM CORPORATIONInventors: Robert Uyeki, Charles Bradford Vincent, Xiao Song Ran, David Wong Cun, Richard Asato, Thomas Clay Luthy
-
Publication number: 20190108141Abstract: A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.Type: ApplicationFiled: November 29, 2018Publication date: April 11, 2019Applicant: Georgetown UniversityInventor: Thomas Clay Shields
-
Patent number: 10146705Abstract: A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.Type: GrantFiled: October 27, 2016Date of Patent: December 4, 2018Assignee: Georgetown UniversityInventor: Thomas Clay Shields
-
Publication number: 20170147510Abstract: A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.Type: ApplicationFiled: October 27, 2016Publication date: May 25, 2017Applicant: Georgetown UniversityInventor: Thomas Clay Shields
-
Publication number: 20170030064Abstract: This invention relates to control of obnoxious odors from toilet bowl by fogging nozzles. This is accomplished by mounting fogging nozzles on an independent insert installed under the toilet seat on common mounting holes. Fogging nozzles are fed from the household water supply at 40-60 PSI. This is achieved by bifurcating water supply to the toilet tank or such water sources available in the bathroom. A control valve is used to control water supply and regulate water pressure to the fogging nozzles. Nozzles are directed to produce atomizing fog to fill the volume of the toilet bowl to capture and absorb air born odor molecules and drop into the pool of water in the bowl. Eventually the odor laden water is flushed at the end of cleaning cycle.Type: ApplicationFiled: June 26, 2016Publication date: February 2, 2017Inventor: Thomas Clay Spencer
-
Publication number: 20160375783Abstract: Systems, methods, and other embodiments associated with identifying a user of a charging station. According to one embodiment, a system includes a communication logic and an authorization logic. The communication logic aggregates transaction data to an authorizing entity. The transaction data is associated with a user and a chargeable vehicle. The authorization logic receives an authorization request to authorize a transaction between the chargeable vehicle and the charging station. The authorization logic sends a response to the authorization request. The communication also enables the chargeable vehicle to receive a charge from the charging station based on the response to the authorization request.Type: ApplicationFiled: June 24, 2015Publication date: December 29, 2016Inventors: Robert Uyeki, Charles Bradford Vincent, Xiao Song Ran, David Wong Cun, Richard Asato, Thomas Clay Luthy
-
Patent number: 9483640Abstract: A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.Type: GrantFiled: April 1, 2014Date of Patent: November 1, 2016Assignee: Georgetown UniversityInventor: Thomas Clay Shields
-
Publication number: 20150281273Abstract: A system and method for deterring malicious network attacks. The system and method is configured to execute instructions on at least one of the processors to generate a plurality of random blocks of data; generate a first XOR result by using the XOR function with the plurality of random blocks of data as the XOR function inputs; generate a tail value by using the XOR function with the first XOR result and a random encryption key as the XOR function inputs; encrypt a designated file using the random encryption key; write the plurality of random blocks and tail value to at least one storage medium; and write the encrypted designated file to at least one storage medium.Type: ApplicationFiled: April 1, 2014Publication date: October 1, 2015Applicant: GEORGETOWN UNIVERSITYInventor: Thomas Clay SHIELDS
-
Patent number: 8438174Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Forensic signatures are created including a digital fingerprint and other information associated with a file. In one aspect, informational signatures are created, which may assist in determining what information is included in a file. In another aspect, the digital fingerprint may represent contents of the file and is resistant to minor modification of the file. In another aspect, fingerprints can be compared in parallel on different computers.Type: GrantFiled: June 24, 2010Date of Patent: May 7, 2013Assignee: Georgetown UniversityInventors: Thomas Clay Shields, Ophir Frieder, Marcus A. Maloof
-
Patent number: 8312023Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Digital representations are generated proactively for a specified target. A digital representation is a digest of the content of the target. Digital representations of a collection of targets indexed and organized in a data structure, such as an inverted index. The searching and comparison of digital representations of a collection of targets allows quick and accurate identification of targets having identical or similar content. Computational and storage costs are expended in advance, which allows more efficient computer forensic investigations. The present invention can be applied to numerous applications, such as computer forensic evidence gathering, misuse detection, network intrusion detection, and unauthorized network traffic detection and prevention.Type: GrantFiled: May 12, 2008Date of Patent: November 13, 2012Assignee: Georgetown UniversityInventors: Thomas Clay Shields, Ophir Frieder, Marcus A. Maloof
-
Patent number: 8280905Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Digital signatures are generated proactively for a specified target. The digital signature represents a digest of the content of the target, and can be readily stored. Searching and comparing digital signatures allows quick and accurate identification of targets having identical or similar content. Computational and storage costs are expended in advance, which allow more efficient computer forensic investigations. The present invention can be applied to numerous applications, such as computer forensic evidence gathering, misuse detection, network intrusion detection, and unauthorized network traffic detection and prevention.Type: GrantFiled: December 21, 2007Date of Patent: October 2, 2012Assignee: Georgetown UniversityInventors: Thomas Clay Shields, Ophir Frieder, Marcus A. Maloof
-
Patent number: 8096731Abstract: A connection assembly for connecting sub-sea lines and devices includes a stab receptacle assembly and a stab assembly. The stab receptacle assembly includes a receptacle body and an outlet assembly, which in turn, includes an adapter nipple configured for attachment to the first sub-sea line. A swivel flange secures the adapter nipple to the first side of the receptacle body. The use of the adapter nipple and swivel flange eliminates a difficult weld between the adapter nipple and the receptacle body. The connection assembly further includes a stab assembly that has a base, a line end connected to the base and a stab body connected to the base. The stab body is configured for insertion into the stab receptacle. The line end is configured for connection to the second sub-sea line.Type: GrantFiled: February 3, 2010Date of Patent: January 17, 2012Inventors: Britton F. Piper, Thomas Clay, Barrett Hartman
-
Publication number: 20100287196Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Forensic signatures are created including a digital fingerprint and other information associated with a file. In one aspect, informational signatures are created, which may assist in determining what information is included in a file. In another aspect, the digital fingerprint may represent contents of the file and is resistant to minor modification of the file. In another aspect, fingerprints can be compared in parallel on different computers.Type: ApplicationFiled: June 24, 2010Publication date: November 11, 2010Inventors: Thomas Clay SHIELDS, Ophir Frieder, Marcus A. Maloof
-
Publication number: 20100209198Abstract: A connection assembly for connecting sub-sea lines and devices includes a stab receptacle assembly and a stab assembly. The stab receptacle assembly includes a receptacle body and an outlet assembly, which in turn, includes an adapter nipple configured for attachment to the first sub-sea line. A swivel flange secures the adapter nipple to the first side of the receptacle body. The use of the adapter nipple and swivel flange eliminates a difficult weld between the adapter nipple and the receptacle body. The connection assembly further includes a stab assembly that has a base, a line end connected to the base and a stab body connected to the base. The stab body is configured for insertion into the stab receptacle. The line end is configured for connection to the second sub-sea line.Type: ApplicationFiled: February 3, 2010Publication date: August 19, 2010Applicant: PIPER VALVE SYSTEMS, LTD. CO.Inventors: Britton F. Piper, Thomas Clay, Barrett Hartman
-
Publication number: 20090164517Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Digital signatures are generated proactively for a specified target. The digital signature represents a digest of the content of the target, and can be readily stored. Searching and comparing digital signatures allows quick and accurate identification of targets having identical or similar content. Computational and storage costs are expended in advance, which allow more efficient computer forensic investigations. The present invention can be applied to numerous applications, such as computer forensic evidence gathering, misuse detection, network intrusion detection, and unauthorized network traffic detection and prevention.Type: ApplicationFiled: December 21, 2007Publication date: June 25, 2009Inventors: Thomas Clay SHIELDS, Ophir Frieder, Marcus A. Maloof
-
Publication number: 20090164427Abstract: Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Digital representations are generated proactively for a specified target. A digital representation is a digest of the content of the target. Digital representations of a collection of targets indexed and organized in a data structure, such as an inverted index. The searching and comparison of digital representations of a collection of targets allows quick and accurate identification of targets having identical or similar content. Computational and storage costs are expended in advance, which allows more efficient computer forensic investigations. The present invention can be applied to numerous applications, such as computer forensic evidence gathering, misuse detection, network intrusion detection, and unauthorized network traffic detection and prevention.Type: ApplicationFiled: May 12, 2008Publication date: June 25, 2009Inventors: Thomas Clay Shields, Ophir Frieder, Marcus A. Maloof
-
Publication number: 20080112761Abstract: A process for treating contaminants present in subsurface source zones comprises in situ admixing of contaminated media, chemical oxidants and stabilizing agents using known soil-mixing techniques. A grout for treating contaminants present in soil comprises chemical oxidants and stabilizing agents.Type: ApplicationFiled: April 19, 2007Publication date: May 15, 2008Applicant: COLORADO STATE UNIVERSITY RESEARCH FOUNDATIONInventors: Thomas Clay Sale, David M. Gilbert
-
Patent number: 6926038Abstract: Reinforced hose, especially useful for transmitting synthetic transmission fluids and having enhanced thermal resistance includes a chlorinated polyethylene tube which is vulcanized with a blend of peroxides and cross-linking coagents to provide resistance to degradation caused by synthetic transmission oil. A plasticizer comprised of a blend of polymeric and ester based materials provides improved high temperature and low temperature properties. The tube is reinforced by a woven layer of metal wire which is in turn covered by a rubber adhesive layer that is overlain by a woven layer of yarn. The woven yarn braid is covered with a coating of polyurethane material in order to improve abrasion resistance and to prevent yarn fiber from being caught on rough surfaces that the hose may be dragged across. The entire hose is vulcanized after its assembly and then rapidly cooled.Type: GrantFiled: December 31, 2001Date of Patent: August 9, 2005Assignee: Eaton CorporationInventors: James Thomas Cook, Thomas Clay Croft