Patents by Inventor Thomas E. Carroll

Thomas E. Carroll has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11805104
    Abstract: Computing system operational methods and apparatus are described. According to one aspect, a computing system operational method includes accessing user information regarding a user logging onto a computing device of the computing system, processing the user information to determine if the user information is authentic, as a result of the processing determining that the user information is authentic, first enabling the computing device to execute an application segment, and as a result of the processing determining that the user information is authentic, second enabling the application segment to communicate data externally of the computing device via one of a plurality of network segments of the computing system.
    Type: Grant
    Filed: December 14, 2018
    Date of Patent: October 31, 2023
    Assignee: Battelle Memorial Institute
    Inventors: Thomas W. Edgar, Thomas E. Carroll, Garret E. Seppala
  • Patent number: 11706192
    Abstract: A cybersecurity infrastructure command validation system is provided herein for validating asset commands issued within an infrastructure network. The cybersecurity infrastructure command validation system can be integrated into an infrastructure network to monitor and validate infrastructure asset commands in real-time or while the infrastructure network is active. The cybersecurity infrastructure command validation system can receive or intercept commands issued by asset controllers. The cybersecurity infrastructure command validation system can validate the commands based on a command validation model. The command validation model can represent normal operating behavior of the infrastructure network. The cybersecurity infrastructure command validation system can provide valid commands to the intended infrastructure asset, or can reject invalid commands. The cybersecurity infrastructure command validation system can store validation results for use in updating the command validation model.
    Type: Grant
    Filed: October 16, 2019
    Date of Patent: July 18, 2023
    Assignee: Battelle Memorial Institute
    Inventors: Bora A. Akyol, Jereme N. Haack, Thomas E. Carroll, Kyle E. Monson, Penny L. McKenzie, Keith W. Thornhill, Michael E. Mylrea
  • Publication number: 20220150226
    Abstract: Computing system operational methods and apparatus are described. According to one aspect, a computing system operational method includes accessing user information regarding a user logging onto a computing device of the computing system, processing the user information to determine if the user information is authentic, as a result of the processing determining that the user information is authentic, first enabling the computing device to execute an application segment, and as a result of the processing determining that the user information is authentic, second enabling the application segment to communicate data externally of the computing device via one of a plurality of network segments of the computing system.
    Type: Application
    Filed: January 26, 2022
    Publication date: May 12, 2022
    Applicant: Battelle Memorial Institute
    Inventors: Thomas W. Edgar, Thomas E. Carroll, Garret E. Seppala
  • Patent number: 10833954
    Abstract: A network analysis tool receives network flow information and uses deep learning—machine learning that models high-level abstractions in the network flow information—to identify dependencies between network assets. Based on the identified dependencies, the network analysis tool can discover functional relationships between network assets. For example, a network analysis tool receives network flow information, identifies dependencies between multiple network assets based on evaluation of the network flow information, and outputs results of the identification of the dependencies. When evaluating the network flow information, the network analysis tool can pre-process the network flow information to produce input vectors, use deep learning to extract patterns in the input vectors, and then determine dependencies based on the extracted patterns. The network analysis tool can repeat this process so as to update an assessment of the dependencies between network assets on a near real-time basis.
    Type: Grant
    Filed: November 19, 2014
    Date of Patent: November 10, 2020
    Assignee: Battelle Memorial Institute
    Inventors: Thomas E. Carroll, Satish Chikkagoudar, Thomas W. Edgar, Kiri J. Oler, Kristine M. Arthur, Daniel M. Johnson, Lars J. Kangas
  • Publication number: 20200195616
    Abstract: Computing system operational methods and apparatus are described. According to one aspect, a computing system operational method includes accessing user information regarding a user logging onto a computing device of the computing system, processing the user information to determine if the user information is authentic, as a result of the processing determining that the user information is authentic, first enabling the computing device to execute an application segment, and as a result of the processing determining that the user information is authentic, second enabling the application segment to communicate data externally of the computing device via one of a plurality of network segments of the computing system.
    Type: Application
    Filed: December 14, 2018
    Publication date: June 18, 2020
    Applicant: Battelle Memorial Institute
    Inventors: Thomas W. Edgar, Thomas E. Carroll, Garret E. Seppala
  • Patent number: 10637744
    Abstract: A network analysis tool evaluates network flow information in complementary workflows to identify one-hop behavior of network assets and also identify multi-hop dependencies between network assets. In one workflow (e.g., using association rule learning), the network analysis tool can identify significant one-hop communication patterns to and/or from network assets, taken individually. Based on the identified one-hop behavior, the network analysis tool can discover patterns of similar communication among different network assets, which can inform decisions about deploying patch sets, mitigating damage, configuring a system, or detecting anomalous behavior. In a different workflow (e.g., using deep learning or cross-correlation analysis), the network analysis tool can identify significant multi-hop communication patterns that involve network assets in combination.
    Type: Grant
    Filed: April 12, 2017
    Date of Patent: April 28, 2020
    Assignee: Battelle Memorial Institute
    Inventors: Thomas E. Carroll, Satish Chikkagoudar, Kristine M. Arthur-Durett, Dennis G. Thomas
  • Publication number: 20200127973
    Abstract: A cybersecurity infrastructure command validation system is provided herein for validating asset commands issued within an infrastructure network. The cybersecurity infrastructure command validation system can be integrated into an infrastructure network to monitor and validate infrastructure asset commands in real-time or while the infrastructure network is active. The cybersecurity infrastructure command validation system can receive or intercept commands issued by asset controllers. The cybersecurity infrastructure command validation system can validate the commands based on a command validation model. The command validation model can represent normal operating behavior of the infrastructure network. The cybersecurity infrastructure command validation system can provide valid commands to the intended infrastructure asset, or can reject invalid commands. The cybersecurity infrastructure command validation system can store validation results for use in updating the command validation model.
    Type: Application
    Filed: October 16, 2019
    Publication date: April 23, 2020
    Applicant: Battelle Memorial Institute
    Inventors: Bora A. Akyol, Jereme N. Haack, Thomas E. Carroll, Kyle E. Monson, Penny L. McKenzie, Keith W. Thornhill, Michael E. Mylrea
  • Publication number: 20180302306
    Abstract: A network analysis tool evaluates network flow information in complementary workflows to identify one-hop behavior of network assets and also identify multi-hop dependencies between network assets. In one workflow (e.g., using association rule learning), the network analysis tool can identify significant one-hop communication patterns to and/or from network assets, taken individually. Based on the identified one-hop behavior, the network analysis tool can discover patterns of similar communication among different network assets, which can inform decisions about deploying patch sets, mitigating damage, configuring a system, or detecting anomalous behavior. In a different workflow (e.g., using deep learning or cross-correlation analysis), the network analysis tool can identify significant multi-hop communication patterns that involve network assets in combination.
    Type: Application
    Filed: April 12, 2017
    Publication date: October 18, 2018
    Inventors: Thomas E. Carroll, Satish Chikkagoudar, Kristine M. Arthur-Durett, Dennis G. Thomas
  • Publication number: 20160142266
    Abstract: A network analysis tool receives network flow information and uses deep learning—machine learning that models high-level abstractions in the network flow information—to identify dependencies between network assets. Based on the identified dependencies, the network analysis tool can discover functional relationships between network assets. For example, a network analysis tool receives network flow information, identifies dependencies between multiple network assets based on evaluation of the network flow information, and outputs results of the identification of the dependencies. When evaluating the network flow information, the network analysis tool can pre-process the network flow information to produce input vectors, use deep learning to extract patterns in the input vectors, and then determine dependencies based on the extracted patterns. The network analysis tool can repeat this process so as to update an assessment of the dependencies between network assets on a near real-time basis.
    Type: Application
    Filed: November 19, 2014
    Publication date: May 19, 2016
    Applicant: BATTELLE MEMORIAL INSTITUTE
    Inventors: Thomas E. Carroll, Satish Chikkagoudar, Thomas W. Edgar, Kiri J. Oler, Kristine M. Arthur, Daniel M. Johnson, Lars J. Kangas
  • Patent number: 6565838
    Abstract: A skin refining composition contains five surfactants: sodium lauryl ether sulfate, cocoamidopropylbetaine, decyl polyglucoside, sucrose cocoate, and an amphoteric detergent. The composition also contains a sub-micron conditioning emulsion. The emulsion contains a silicone, a moisturizer, a humectant, and glycerin. The composition cleanses, exfoliates, and conditions the skin. The composition is applied with an applicator containing a foam pad and an integral brush having tapered bristles.
    Type: Grant
    Filed: October 24, 2002
    Date of Patent: May 20, 2003
    Inventors: Thomas E. Carroll, Ralph J. Cataneo
  • Publication number: 20020048603
    Abstract: A hydrogel composition and method of forming such composition suitable as a cosmetic composition for application to skin or hair is provided. The hydrogel composition comprises two or more gelling agents in an aqueous solution. The two or more gelling agents are hydrogen bonded so as to create a co-polymer network in the aqueous solution. The hydrogel composition may also include additives such as cross-linking agents, hydrophilic additive and lipophilic additives to modify the properties of the composition.
    Type: Application
    Filed: December 7, 2001
    Publication date: April 25, 2002
    Inventors: Fred Burmeister, Thomas E. Carroll
  • Patent number: D326924
    Type: Grant
    Filed: December 20, 1989
    Date of Patent: June 9, 1992
    Inventor: Thomas E. Carroll