Patents by Inventor William Roscoe

William Roscoe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11983504
    Abstract: A computer implemented method for the automated analysis or use of data is implemented by a voice assistant. The method comprises the steps of: (a) storing in a memory a structured, machine-readable representation of data that conforms to a machine-readable language (‘machine representation’); the machine representation including representations of user speech or text input to a human/machine interface; and (b) automatically processing the machine representations to analyse the user speech or text input.
    Type: Grant
    Filed: December 25, 2022
    Date of Patent: May 14, 2024
    Assignee: UNLIKELY ARTIFICIAL INTELLIGENCE LIMITED
    Inventors: William Tunstall-Pedoe, Finlay Curran, Harry Roscoe, Robert Heywood
  • Publication number: 20240143938
    Abstract: A computer implemented method for the automated analysis or use of data is implemented by a voice assistant. The method comprises the steps of (a) storing in a memory a structured, machine-readable representation of data that conforms to a machine-readable language (‘machine representation’); the machine representation including representations of user speech or text input to a human/machine interface; and (b) automatically processing the machine representations to analyse the user speech or text input.
    Type: Application
    Filed: January 11, 2024
    Publication date: May 2, 2024
    Inventors: William TUNSTALL-PEDOE, Finlay CURRAN, Harry ROSCOE, Robert HEYWOOD
  • Publication number: 20240143939
    Abstract: A computer implemented method for the automated analysis or use of data is implemented by a voice assistant. The method comprises the steps of: (a) storing in a memory a structured, machine-readable representation of data that conforms to a machine-readable language (‘machine representation’); the machine representation including representations of user speech or text input to a human/machine interface; and (b) automatically processing the machine representations to analyse the user speech or text input.
    Type: Application
    Filed: January 11, 2024
    Publication date: May 2, 2024
    Inventors: William TUNSTALL-PEDOE, Finlay CURRAN, Harry ROSCOE, Robert HEYWOOD
  • Publication number: 20240086645
    Abstract: A computer implemented method for the automated analysis or use of data is implemented by a voice assistant. The method comprises the steps of (a) storing in a memory a structured, machine-readable representation of data that conforms to a machine-readable language (‘machine representation’); the machine representation including representations of user speech or text input to a human/machine interface; and (b) automatically processing the machine representations to analyse the user speech or text input.
    Type: Application
    Filed: November 22, 2023
    Publication date: March 14, 2024
    Inventors: William TUNSTALL-PEDOE, Finlay CURRAN, Harry ROSCOE, Robert HEYWOOD
  • Publication number: 20240086644
    Abstract: A computer implemented method for the automated analysis or use of data is implemented by a voice assistant. The method comprises the steps of: (a) storing in a memory a structured, machine-readable representation of data that conforms to a machine-readable language (‘machine representation’); the machine representation including representations of user speech or text input to a human/machine interface; and (b) automatically processing the machine representations to analyse the user speech or text input.
    Type: Application
    Filed: November 22, 2023
    Publication date: March 14, 2024
    Inventors: William TUNSTALL-PEDOE, Finlay CURRAN, Harry ROSCOE, Robert HEYWOOD
  • Publication number: 20230153806
    Abstract: Disclosed is a method and device for preventing blockchain forking. The method includes: selecting s consecutive blocks Bn to Bn+s; generating a key pair for block Bm by a node An that creates the block Bn; holding the node An active in the blockchain's continuously generating blocks Bn+1 to Bn+s until the block Bn+s of s consecutive blocks becomes tamper-proof; in response to that, signing on the block Ban+s with the private key PK?n; in response to the blockchain's subsequently generating a block Bm(m>n+s), placing the signature in Bm; making nodes creating each of the s blocks Bn to Bn+s all execute afore-mentioned steps, thereby forming multiple backlinks associated with the blockchain's block size. The number of backlinks is used for determining blockchain forking by a newly-added node creating a new block.
    Type: Application
    Filed: April 8, 2021
    Publication date: May 18, 2023
    Inventors: Bangdao CHEN, Andrew William ROSCOE
  • Patent number: 11336464
    Abstract: The method of identity authentication at the user is provided to prove to the certificate authority that a key is owned by a user. The method can comprise selecting a certain number of keys from a set of keys of the user, obtaining a hash value of a correspondence between each key in the certain number of keys and a user identifier of the user respectively, and transmitting the obtained hash values to the certificate authority, and after receiving from the certificate authority a notification regarding a first subset of hash values, sending keys corresponding to the first subset of hash values as a first subset of keys to the certificate authority. The first subset of hash values can be selected by the certificate authority from the obtained hash values. Zero know ledge proof can be achieved with this technical solution.
    Type: Grant
    Filed: April 23, 2018
    Date of Patent: May 17, 2022
    Assignee: CROSBIL LTD.
    Inventors: Andrew William Roscoe, Bangdao Chen
  • Patent number: 11258613
    Abstract: Disclosed are methods and apparatuses for electronic signature. The method for electronic signature comprises obtaining a hash value of a first key created for a user and a user identifier of the user, generating a key certificate of the first key based on the obtained hash value, the user identifier and a current key, recording the key certificate on a public medium, which public medium ensures that information published thereon is not tampered with, signing a file with the first key and recording a resulting file signature and the file on the public medium, and recording the first key on the public medium only after the file is already on the public medium. With the technical solution of the disclosure, a key can be effectively utilized.
    Type: Grant
    Filed: April 23, 2018
    Date of Patent: February 22, 2022
    Assignee: CROSBIL LTD.
    Inventors: Andrew William Roscoe, Bangdao Chen
  • Publication number: 20210194702
    Abstract: Disclosed are methods and systems for identity authentication, and a computing device and a storage medium. The method of identity authentication at the user is provided to prove to the certificate authority that a key is owned by a user. The method can comprise selecting a certain number of keys from a set of keys of the user, obtaining a hash value of a correspondence between each key in the certain number of keys and a user identifier of the user respectively, and transmitting the obtained hash values to the certificate authority, and after receiving, from the certificate authority a notification regarding a first subset of hash values, sending keys corresponding to the first subset of hash values as a first subset of keys to the certificate authority. The first subset of hash values can be selected by the certificate authority from the obtained hash values. Zero knowledge proof can be achieved with the technical solution of the disclosure.
    Type: Application
    Filed: April 23, 2018
    Publication date: June 24, 2021
    Inventors: Andrew William ROSCOE, Bangdao CHEN
  • Patent number: 11032256
    Abstract: A computer implemented method of exchanging first valuable data at a first node for second valuable data from a second node, the method comprising the steps of: applying a first encryption to a first plurality of messages, at the first node, with a function having a commutative property, so as to create a blinded first plurality of messages; sending the blinded first plurality of messages from the first node to the second node, wherein the first valuable data is concealed in one message of the blinded first plurality of messages; receiving a blinded second plurality of messages at the first node, wherein the second valuable data is concealed in one message of the blinded second plurality of messages and the blinded second plurality of messages have been encrypted with a second encryption; in response to receiving the blinded second plurality of messages at the first node, applying a third encryption to the blinded second plurality of messages with a function having a commutative property so as to create do
    Type: Grant
    Filed: March 16, 2018
    Date of Patent: June 8, 2021
    Assignee: Oxford University Innovation Limited
    Inventors: Andrew William Roscoe, Peter Yvain Anthony Ryan
  • Publication number: 20210167963
    Abstract: First and second devices store respective device data and private keys. The first-device data is additionally stored by the second device and by a proxy; and the second-device data is additionally stored by the first device and by the proxy. In a commitment phase, each of the first and second devices uses its respective device data, private key and a random nonce to generate a one-time first-device commitment value, which it sends to the proxy. In a checking phase, the devices communicate secret-key information to the proxy, which verifies the received one-time commitment values. In a digest phase, the proxy calculates a one-time digest, which it sends to the second device. The second device (101) then verifies the received one-time digest to authenticate the first device.
    Type: Application
    Filed: May 31, 2019
    Publication date: June 3, 2021
    Inventors: Christopher Patrick AUTRY, Andrew William ROSCOE, Mykhailo MAGAL
  • Patent number: 10958426
    Abstract: A computer implemented method of authenticating communication between a first node and a second node, using a function of combined information obtained from at least one of the nodes, the method comprising: sending a commitment message from the first node to the second node, the message containing content based on (at least) a first part of the combined information, which content commits the first node to a first value of the function, and wherein the first part of the combined information is communicated from the first node to the second node with a delay mechanism that only allows the first part of the information to be determined by the second node after a predetermined time; and in response to receiving notification at the first node that the second node has received the message, which receipt commits the second node to the first function value.
    Type: Grant
    Filed: January 18, 2017
    Date of Patent: March 23, 2021
    Inventor: Andrew William Roscoe
  • Publication number: 20200344064
    Abstract: Disclosed are methods and apparatuses for electronic signature. The method for electronic signature comprises obtaining a hash value of a first key created for a user and a user identifier of the user, generating a key certificate of the first key based on the obtained hash value, the user identifier and a current key, recording the key certificate on a public medium, which public medium ensures that information published thereon is not tampered with, signing a file with the first key and recording a resulting file signature and the file on the public medium, and recording the first key on the public medium only after the file is already on the public medium. With the technical solution of the disclosure, a key can be effectively utilized.
    Type: Application
    Filed: April 23, 2018
    Publication date: October 29, 2020
    Inventors: Andrew William ROSCOE, Bangdao CHEN
  • Publication number: 20200036691
    Abstract: A computer implemented method of exchanging first valuable data at a first node for second valuable data from a second node, the method comprising the steps of: applying a first encryption to a first plurality of messages, at the first node, with a function having a commutative property, so as to create a blinded first plurality of messages; sending the blinded first plurality of messages from the first node to the second node, wherein the first valuable data is concealed in one message of the blinded first plurality of messages; receiving a blinded second plurality of messages at the first node, wherein the second valuable data is concealed in one message of the blinded second plurality of messages and the blinded second plurality of messages have been encrypted with a second encryption; in response to receiving the blinded second plurality of messages at the first node, applying a third encryption to the blinded second plurality of messages with a function having a commutative property so as to create do
    Type: Application
    Filed: March 16, 2018
    Publication date: January 30, 2020
    Applicant: Oxford University Innovation Limited
    Inventors: Andrew William ROSCOE, Peter Yvain Antony RYAN
  • Publication number: 20190044711
    Abstract: A computer implemented method of authenticating communication between a first node and a second node, using a function of combined information obtained from at least one of the nodes, the method comprising: sending a commitment message from the first node to the second node, the message containing content based on (at least) a first part of the combined information, which content commits the first node to a first value of the function, and wherein the first part of the combined information is communicated from the first node to the second node with a delay mechanism that only allows the first part of the information to be determined by the second node after a predetermined time; and in response to receiving notification at the first node that the second node has received the message, which receipt commits the second node to the first function value.
    Type: Application
    Filed: January 18, 2017
    Publication date: February 7, 2019
    Applicant: OXFORD UNIVERSITY INNOVATION LIMITED
    Inventor: Andrew William ROSCOE
  • Patent number: 9342520
    Abstract: An embodiment generally relates to a method for displaying data. The method for displaying data includes a changeable directory module (CDM). The CDM is configured to determine a plurality of attributes for a data set. In determining a plurality of symbols, the CDM associates each symbol with a respective attribute. The CDM is configured to display an initial sequence of symbols on a navigation pane. The CDM is also configured to re-sequence the initial sequence of symbols and display the data set according to the re-sequence of symbols on a display pane.
    Type: Grant
    Filed: December 6, 2006
    Date of Patent: May 17, 2016
    Assignee: Xerox Corporation
    Inventor: Gary William Roscoe
  • Patent number: 9270450
    Abstract: A method of authenticating communication between a first and second party (or node) over an insecure, high bandwidth communications network, in which the first party (C) authenticates the second party (M) using a communications protocol comprising a first communications phase through a first communications channel over the insecure, high bandwidth communications network to establish a secure mode of communications between the first and second party, followed by a second communications phase of receiving information from the second party over a second communications channel, such as an empirical channel, and enabling a user to make a human comparison of the information received from the second party with information generated by the first party thereby enabling the user to authenticate the second party in the event of the information from both parties agrees.
    Type: Grant
    Filed: December 21, 2007
    Date of Patent: February 23, 2016
    Assignee: Isis Innovation Limited
    Inventor: Andrew William Roscoe
  • Patent number: 9036309
    Abstract: A circuit protection device includes a plasma gun configured to emit an ablative plasma along an axis, and a plurality of electrodes, wherein each electrode is electrically coupled to a respective conductor of a circuit and is arranged substantially along a plane that is substantially perpendicular to the axis such that each electrode is positioned substantially equidistant from the axis.
    Type: Grant
    Filed: September 16, 2010
    Date of Patent: May 19, 2015
    Assignee: General Electric Company
    Inventors: George William Roscoe, Dean Arthur Robarge, Robert Joseph Caggiano, Seth Adam Cutler, Thangavelu Asokan, Adnan Kutubuddin Bohori
  • Patent number: 8649139
    Abstract: A power circuit protection system includes a current sensor configured to measure a first current level through a conductor of the circuit, a voltage sensor configured to measure a first voltage level across a plurality of conductors of the circuit, and a controller communicatively coupled to the current sensor and to the voltage sensor. The controller is configured to receive a first signal from the current sensor, wherein the first signal is representative of the first current level, and receive a second signal from the voltage sensor, wherein the second signal is representative of the first voltage level. Based on the first signal and the second signal, the controller is configured to determine whether to activate a first circuit protection device or a second circuit protection device.
    Type: Grant
    Filed: August 23, 2010
    Date of Patent: February 11, 2014
    Assignee: General Electric Company
    Inventors: George William Roscoe, Robert Caggiano, Henry Hall Mason, Jr., Craig Benjamin Williams
  • Patent number: 8575916
    Abstract: A power equipment protection system includes a first circuit monitoring device configured to monitor a first circuit, a second circuit monitoring device configured to monitor a second circuit that is electrically coupled to the first circuit, and a processor communicatively coupled to the first circuit monitoring device and the second circuit monitoring device. The processor is configured to receive a signal indicative of a fault from at least one of the first circuit monitoring device and the second circuit monitoring device, determine whether the fault occurred in the first circuit or in the second circuit, and if the fault occurred in the second circuit, determine whether the fault is an arc event.
    Type: Grant
    Filed: December 8, 2010
    Date of Patent: November 5, 2013
    Assignee: General Electric Company
    Inventor: George William Roscoe