Patents by Inventor Thomas E. Carroll
Thomas E. Carroll has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11805104Abstract: Computing system operational methods and apparatus are described. According to one aspect, a computing system operational method includes accessing user information regarding a user logging onto a computing device of the computing system, processing the user information to determine if the user information is authentic, as a result of the processing determining that the user information is authentic, first enabling the computing device to execute an application segment, and as a result of the processing determining that the user information is authentic, second enabling the application segment to communicate data externally of the computing device via one of a plurality of network segments of the computing system.Type: GrantFiled: December 14, 2018Date of Patent: October 31, 2023Assignee: Battelle Memorial InstituteInventors: Thomas W. Edgar, Thomas E. Carroll, Garret E. Seppala
-
Patent number: 11706192Abstract: A cybersecurity infrastructure command validation system is provided herein for validating asset commands issued within an infrastructure network. The cybersecurity infrastructure command validation system can be integrated into an infrastructure network to monitor and validate infrastructure asset commands in real-time or while the infrastructure network is active. The cybersecurity infrastructure command validation system can receive or intercept commands issued by asset controllers. The cybersecurity infrastructure command validation system can validate the commands based on a command validation model. The command validation model can represent normal operating behavior of the infrastructure network. The cybersecurity infrastructure command validation system can provide valid commands to the intended infrastructure asset, or can reject invalid commands. The cybersecurity infrastructure command validation system can store validation results for use in updating the command validation model.Type: GrantFiled: October 16, 2019Date of Patent: July 18, 2023Assignee: Battelle Memorial InstituteInventors: Bora A. Akyol, Jereme N. Haack, Thomas E. Carroll, Kyle E. Monson, Penny L. McKenzie, Keith W. Thornhill, Michael E. Mylrea
-
Publication number: 20220150226Abstract: Computing system operational methods and apparatus are described. According to one aspect, a computing system operational method includes accessing user information regarding a user logging onto a computing device of the computing system, processing the user information to determine if the user information is authentic, as a result of the processing determining that the user information is authentic, first enabling the computing device to execute an application segment, and as a result of the processing determining that the user information is authentic, second enabling the application segment to communicate data externally of the computing device via one of a plurality of network segments of the computing system.Type: ApplicationFiled: January 26, 2022Publication date: May 12, 2022Applicant: Battelle Memorial InstituteInventors: Thomas W. Edgar, Thomas E. Carroll, Garret E. Seppala
-
Patent number: 10833954Abstract: A network analysis tool receives network flow information and uses deep learning—machine learning that models high-level abstractions in the network flow information—to identify dependencies between network assets. Based on the identified dependencies, the network analysis tool can discover functional relationships between network assets. For example, a network analysis tool receives network flow information, identifies dependencies between multiple network assets based on evaluation of the network flow information, and outputs results of the identification of the dependencies. When evaluating the network flow information, the network analysis tool can pre-process the network flow information to produce input vectors, use deep learning to extract patterns in the input vectors, and then determine dependencies based on the extracted patterns. The network analysis tool can repeat this process so as to update an assessment of the dependencies between network assets on a near real-time basis.Type: GrantFiled: November 19, 2014Date of Patent: November 10, 2020Assignee: Battelle Memorial InstituteInventors: Thomas E. Carroll, Satish Chikkagoudar, Thomas W. Edgar, Kiri J. Oler, Kristine M. Arthur, Daniel M. Johnson, Lars J. Kangas
-
Publication number: 20200195616Abstract: Computing system operational methods and apparatus are described. According to one aspect, a computing system operational method includes accessing user information regarding a user logging onto a computing device of the computing system, processing the user information to determine if the user information is authentic, as a result of the processing determining that the user information is authentic, first enabling the computing device to execute an application segment, and as a result of the processing determining that the user information is authentic, second enabling the application segment to communicate data externally of the computing device via one of a plurality of network segments of the computing system.Type: ApplicationFiled: December 14, 2018Publication date: June 18, 2020Applicant: Battelle Memorial InstituteInventors: Thomas W. Edgar, Thomas E. Carroll, Garret E. Seppala
-
Patent number: 10637744Abstract: A network analysis tool evaluates network flow information in complementary workflows to identify one-hop behavior of network assets and also identify multi-hop dependencies between network assets. In one workflow (e.g., using association rule learning), the network analysis tool can identify significant one-hop communication patterns to and/or from network assets, taken individually. Based on the identified one-hop behavior, the network analysis tool can discover patterns of similar communication among different network assets, which can inform decisions about deploying patch sets, mitigating damage, configuring a system, or detecting anomalous behavior. In a different workflow (e.g., using deep learning or cross-correlation analysis), the network analysis tool can identify significant multi-hop communication patterns that involve network assets in combination.Type: GrantFiled: April 12, 2017Date of Patent: April 28, 2020Assignee: Battelle Memorial InstituteInventors: Thomas E. Carroll, Satish Chikkagoudar, Kristine M. Arthur-Durett, Dennis G. Thomas
-
Publication number: 20200127973Abstract: A cybersecurity infrastructure command validation system is provided herein for validating asset commands issued within an infrastructure network. The cybersecurity infrastructure command validation system can be integrated into an infrastructure network to monitor and validate infrastructure asset commands in real-time or while the infrastructure network is active. The cybersecurity infrastructure command validation system can receive or intercept commands issued by asset controllers. The cybersecurity infrastructure command validation system can validate the commands based on a command validation model. The command validation model can represent normal operating behavior of the infrastructure network. The cybersecurity infrastructure command validation system can provide valid commands to the intended infrastructure asset, or can reject invalid commands. The cybersecurity infrastructure command validation system can store validation results for use in updating the command validation model.Type: ApplicationFiled: October 16, 2019Publication date: April 23, 2020Applicant: Battelle Memorial InstituteInventors: Bora A. Akyol, Jereme N. Haack, Thomas E. Carroll, Kyle E. Monson, Penny L. McKenzie, Keith W. Thornhill, Michael E. Mylrea
-
Publication number: 20180302306Abstract: A network analysis tool evaluates network flow information in complementary workflows to identify one-hop behavior of network assets and also identify multi-hop dependencies between network assets. In one workflow (e.g., using association rule learning), the network analysis tool can identify significant one-hop communication patterns to and/or from network assets, taken individually. Based on the identified one-hop behavior, the network analysis tool can discover patterns of similar communication among different network assets, which can inform decisions about deploying patch sets, mitigating damage, configuring a system, or detecting anomalous behavior. In a different workflow (e.g., using deep learning or cross-correlation analysis), the network analysis tool can identify significant multi-hop communication patterns that involve network assets in combination.Type: ApplicationFiled: April 12, 2017Publication date: October 18, 2018Inventors: Thomas E. Carroll, Satish Chikkagoudar, Kristine M. Arthur-Durett, Dennis G. Thomas
-
Publication number: 20160142266Abstract: A network analysis tool receives network flow information and uses deep learning—machine learning that models high-level abstractions in the network flow information—to identify dependencies between network assets. Based on the identified dependencies, the network analysis tool can discover functional relationships between network assets. For example, a network analysis tool receives network flow information, identifies dependencies between multiple network assets based on evaluation of the network flow information, and outputs results of the identification of the dependencies. When evaluating the network flow information, the network analysis tool can pre-process the network flow information to produce input vectors, use deep learning to extract patterns in the input vectors, and then determine dependencies based on the extracted patterns. The network analysis tool can repeat this process so as to update an assessment of the dependencies between network assets on a near real-time basis.Type: ApplicationFiled: November 19, 2014Publication date: May 19, 2016Applicant: BATTELLE MEMORIAL INSTITUTEInventors: Thomas E. Carroll, Satish Chikkagoudar, Thomas W. Edgar, Kiri J. Oler, Kristine M. Arthur, Daniel M. Johnson, Lars J. Kangas
-
Patent number: 6565838Abstract: A skin refining composition contains five surfactants: sodium lauryl ether sulfate, cocoamidopropylbetaine, decyl polyglucoside, sucrose cocoate, and an amphoteric detergent. The composition also contains a sub-micron conditioning emulsion. The emulsion contains a silicone, a moisturizer, a humectant, and glycerin. The composition cleanses, exfoliates, and conditions the skin. The composition is applied with an applicator containing a foam pad and an integral brush having tapered bristles.Type: GrantFiled: October 24, 2002Date of Patent: May 20, 2003Inventors: Thomas E. Carroll, Ralph J. Cataneo
-
Publication number: 20020048603Abstract: A hydrogel composition and method of forming such composition suitable as a cosmetic composition for application to skin or hair is provided. The hydrogel composition comprises two or more gelling agents in an aqueous solution. The two or more gelling agents are hydrogen bonded so as to create a co-polymer network in the aqueous solution. The hydrogel composition may also include additives such as cross-linking agents, hydrophilic additive and lipophilic additives to modify the properties of the composition.Type: ApplicationFiled: December 7, 2001Publication date: April 25, 2002Inventors: Fred Burmeister, Thomas E. Carroll
-
Patent number: D326924Type: GrantFiled: December 20, 1989Date of Patent: June 9, 1992Inventor: Thomas E. Carroll