Patents by Inventor William Roscoe
William Roscoe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11983504Abstract: A computer implemented method for the automated analysis or use of data is implemented by a voice assistant. The method comprises the steps of: (a) storing in a memory a structured, machine-readable representation of data that conforms to a machine-readable language (‘machine representation’); the machine representation including representations of user speech or text input to a human/machine interface; and (b) automatically processing the machine representations to analyse the user speech or text input.Type: GrantFiled: December 25, 2022Date of Patent: May 14, 2024Assignee: UNLIKELY ARTIFICIAL INTELLIGENCE LIMITEDInventors: William Tunstall-Pedoe, Finlay Curran, Harry Roscoe, Robert Heywood
-
Publication number: 20240143938Abstract: A computer implemented method for the automated analysis or use of data is implemented by a voice assistant. The method comprises the steps of (a) storing in a memory a structured, machine-readable representation of data that conforms to a machine-readable language (‘machine representation’); the machine representation including representations of user speech or text input to a human/machine interface; and (b) automatically processing the machine representations to analyse the user speech or text input.Type: ApplicationFiled: January 11, 2024Publication date: May 2, 2024Inventors: William TUNSTALL-PEDOE, Finlay CURRAN, Harry ROSCOE, Robert HEYWOOD
-
Publication number: 20240143939Abstract: A computer implemented method for the automated analysis or use of data is implemented by a voice assistant. The method comprises the steps of: (a) storing in a memory a structured, machine-readable representation of data that conforms to a machine-readable language (‘machine representation’); the machine representation including representations of user speech or text input to a human/machine interface; and (b) automatically processing the machine representations to analyse the user speech or text input.Type: ApplicationFiled: January 11, 2024Publication date: May 2, 2024Inventors: William TUNSTALL-PEDOE, Finlay CURRAN, Harry ROSCOE, Robert HEYWOOD
-
Publication number: 20240086645Abstract: A computer implemented method for the automated analysis or use of data is implemented by a voice assistant. The method comprises the steps of (a) storing in a memory a structured, machine-readable representation of data that conforms to a machine-readable language (‘machine representation’); the machine representation including representations of user speech or text input to a human/machine interface; and (b) automatically processing the machine representations to analyse the user speech or text input.Type: ApplicationFiled: November 22, 2023Publication date: March 14, 2024Inventors: William TUNSTALL-PEDOE, Finlay CURRAN, Harry ROSCOE, Robert HEYWOOD
-
Publication number: 20240086644Abstract: A computer implemented method for the automated analysis or use of data is implemented by a voice assistant. The method comprises the steps of: (a) storing in a memory a structured, machine-readable representation of data that conforms to a machine-readable language (‘machine representation’); the machine representation including representations of user speech or text input to a human/machine interface; and (b) automatically processing the machine representations to analyse the user speech or text input.Type: ApplicationFiled: November 22, 2023Publication date: March 14, 2024Inventors: William TUNSTALL-PEDOE, Finlay CURRAN, Harry ROSCOE, Robert HEYWOOD
-
Publication number: 20230153806Abstract: Disclosed is a method and device for preventing blockchain forking. The method includes: selecting s consecutive blocks Bn to Bn+s; generating a key pair for block Bm by a node An that creates the block Bn; holding the node An active in the blockchain's continuously generating blocks Bn+1 to Bn+s until the block Bn+s of s consecutive blocks becomes tamper-proof; in response to that, signing on the block Ban+s with the private key PK?n; in response to the blockchain's subsequently generating a block Bm(m>n+s), placing the signature in Bm; making nodes creating each of the s blocks Bn to Bn+s all execute afore-mentioned steps, thereby forming multiple backlinks associated with the blockchain's block size. The number of backlinks is used for determining blockchain forking by a newly-added node creating a new block.Type: ApplicationFiled: April 8, 2021Publication date: May 18, 2023Inventors: Bangdao CHEN, Andrew William ROSCOE
-
Patent number: 11336464Abstract: The method of identity authentication at the user is provided to prove to the certificate authority that a key is owned by a user. The method can comprise selecting a certain number of keys from a set of keys of the user, obtaining a hash value of a correspondence between each key in the certain number of keys and a user identifier of the user respectively, and transmitting the obtained hash values to the certificate authority, and after receiving from the certificate authority a notification regarding a first subset of hash values, sending keys corresponding to the first subset of hash values as a first subset of keys to the certificate authority. The first subset of hash values can be selected by the certificate authority from the obtained hash values. Zero know ledge proof can be achieved with this technical solution.Type: GrantFiled: April 23, 2018Date of Patent: May 17, 2022Assignee: CROSBIL LTD.Inventors: Andrew William Roscoe, Bangdao Chen
-
Patent number: 11258613Abstract: Disclosed are methods and apparatuses for electronic signature. The method for electronic signature comprises obtaining a hash value of a first key created for a user and a user identifier of the user, generating a key certificate of the first key based on the obtained hash value, the user identifier and a current key, recording the key certificate on a public medium, which public medium ensures that information published thereon is not tampered with, signing a file with the first key and recording a resulting file signature and the file on the public medium, and recording the first key on the public medium only after the file is already on the public medium. With the technical solution of the disclosure, a key can be effectively utilized.Type: GrantFiled: April 23, 2018Date of Patent: February 22, 2022Assignee: CROSBIL LTD.Inventors: Andrew William Roscoe, Bangdao Chen
-
Publication number: 20210194702Abstract: Disclosed are methods and systems for identity authentication, and a computing device and a storage medium. The method of identity authentication at the user is provided to prove to the certificate authority that a key is owned by a user. The method can comprise selecting a certain number of keys from a set of keys of the user, obtaining a hash value of a correspondence between each key in the certain number of keys and a user identifier of the user respectively, and transmitting the obtained hash values to the certificate authority, and after receiving, from the certificate authority a notification regarding a first subset of hash values, sending keys corresponding to the first subset of hash values as a first subset of keys to the certificate authority. The first subset of hash values can be selected by the certificate authority from the obtained hash values. Zero knowledge proof can be achieved with the technical solution of the disclosure.Type: ApplicationFiled: April 23, 2018Publication date: June 24, 2021Inventors: Andrew William ROSCOE, Bangdao CHEN
-
Patent number: 11032256Abstract: A computer implemented method of exchanging first valuable data at a first node for second valuable data from a second node, the method comprising the steps of: applying a first encryption to a first plurality of messages, at the first node, with a function having a commutative property, so as to create a blinded first plurality of messages; sending the blinded first plurality of messages from the first node to the second node, wherein the first valuable data is concealed in one message of the blinded first plurality of messages; receiving a blinded second plurality of messages at the first node, wherein the second valuable data is concealed in one message of the blinded second plurality of messages and the blinded second plurality of messages have been encrypted with a second encryption; in response to receiving the blinded second plurality of messages at the first node, applying a third encryption to the blinded second plurality of messages with a function having a commutative property so as to create doType: GrantFiled: March 16, 2018Date of Patent: June 8, 2021Assignee: Oxford University Innovation LimitedInventors: Andrew William Roscoe, Peter Yvain Anthony Ryan
-
Publication number: 20210167963Abstract: First and second devices store respective device data and private keys. The first-device data is additionally stored by the second device and by a proxy; and the second-device data is additionally stored by the first device and by the proxy. In a commitment phase, each of the first and second devices uses its respective device data, private key and a random nonce to generate a one-time first-device commitment value, which it sends to the proxy. In a checking phase, the devices communicate secret-key information to the proxy, which verifies the received one-time commitment values. In a digest phase, the proxy calculates a one-time digest, which it sends to the second device. The second device (101) then verifies the received one-time digest to authenticate the first device.Type: ApplicationFiled: May 31, 2019Publication date: June 3, 2021Inventors: Christopher Patrick AUTRY, Andrew William ROSCOE, Mykhailo MAGAL
-
Patent number: 10958426Abstract: A computer implemented method of authenticating communication between a first node and a second node, using a function of combined information obtained from at least one of the nodes, the method comprising: sending a commitment message from the first node to the second node, the message containing content based on (at least) a first part of the combined information, which content commits the first node to a first value of the function, and wherein the first part of the combined information is communicated from the first node to the second node with a delay mechanism that only allows the first part of the information to be determined by the second node after a predetermined time; and in response to receiving notification at the first node that the second node has received the message, which receipt commits the second node to the first function value.Type: GrantFiled: January 18, 2017Date of Patent: March 23, 2021Inventor: Andrew William Roscoe
-
Publication number: 20200344064Abstract: Disclosed are methods and apparatuses for electronic signature. The method for electronic signature comprises obtaining a hash value of a first key created for a user and a user identifier of the user, generating a key certificate of the first key based on the obtained hash value, the user identifier and a current key, recording the key certificate on a public medium, which public medium ensures that information published thereon is not tampered with, signing a file with the first key and recording a resulting file signature and the file on the public medium, and recording the first key on the public medium only after the file is already on the public medium. With the technical solution of the disclosure, a key can be effectively utilized.Type: ApplicationFiled: April 23, 2018Publication date: October 29, 2020Inventors: Andrew William ROSCOE, Bangdao CHEN
-
Publication number: 20200036691Abstract: A computer implemented method of exchanging first valuable data at a first node for second valuable data from a second node, the method comprising the steps of: applying a first encryption to a first plurality of messages, at the first node, with a function having a commutative property, so as to create a blinded first plurality of messages; sending the blinded first plurality of messages from the first node to the second node, wherein the first valuable data is concealed in one message of the blinded first plurality of messages; receiving a blinded second plurality of messages at the first node, wherein the second valuable data is concealed in one message of the blinded second plurality of messages and the blinded second plurality of messages have been encrypted with a second encryption; in response to receiving the blinded second plurality of messages at the first node, applying a third encryption to the blinded second plurality of messages with a function having a commutative property so as to create doType: ApplicationFiled: March 16, 2018Publication date: January 30, 2020Applicant: Oxford University Innovation LimitedInventors: Andrew William ROSCOE, Peter Yvain Antony RYAN
-
Publication number: 20190044711Abstract: A computer implemented method of authenticating communication between a first node and a second node, using a function of combined information obtained from at least one of the nodes, the method comprising: sending a commitment message from the first node to the second node, the message containing content based on (at least) a first part of the combined information, which content commits the first node to a first value of the function, and wherein the first part of the combined information is communicated from the first node to the second node with a delay mechanism that only allows the first part of the information to be determined by the second node after a predetermined time; and in response to receiving notification at the first node that the second node has received the message, which receipt commits the second node to the first function value.Type: ApplicationFiled: January 18, 2017Publication date: February 7, 2019Applicant: OXFORD UNIVERSITY INNOVATION LIMITEDInventor: Andrew William ROSCOE
-
Patent number: 9342520Abstract: An embodiment generally relates to a method for displaying data. The method for displaying data includes a changeable directory module (CDM). The CDM is configured to determine a plurality of attributes for a data set. In determining a plurality of symbols, the CDM associates each symbol with a respective attribute. The CDM is configured to display an initial sequence of symbols on a navigation pane. The CDM is also configured to re-sequence the initial sequence of symbols and display the data set according to the re-sequence of symbols on a display pane.Type: GrantFiled: December 6, 2006Date of Patent: May 17, 2016Assignee: Xerox CorporationInventor: Gary William Roscoe
-
Patent number: 9270450Abstract: A method of authenticating communication between a first and second party (or node) over an insecure, high bandwidth communications network, in which the first party (C) authenticates the second party (M) using a communications protocol comprising a first communications phase through a first communications channel over the insecure, high bandwidth communications network to establish a secure mode of communications between the first and second party, followed by a second communications phase of receiving information from the second party over a second communications channel, such as an empirical channel, and enabling a user to make a human comparison of the information received from the second party with information generated by the first party thereby enabling the user to authenticate the second party in the event of the information from both parties agrees.Type: GrantFiled: December 21, 2007Date of Patent: February 23, 2016Assignee: Isis Innovation LimitedInventor: Andrew William Roscoe
-
Patent number: 9036309Abstract: A circuit protection device includes a plasma gun configured to emit an ablative plasma along an axis, and a plurality of electrodes, wherein each electrode is electrically coupled to a respective conductor of a circuit and is arranged substantially along a plane that is substantially perpendicular to the axis such that each electrode is positioned substantially equidistant from the axis.Type: GrantFiled: September 16, 2010Date of Patent: May 19, 2015Assignee: General Electric CompanyInventors: George William Roscoe, Dean Arthur Robarge, Robert Joseph Caggiano, Seth Adam Cutler, Thangavelu Asokan, Adnan Kutubuddin Bohori
-
Patent number: 8649139Abstract: A power circuit protection system includes a current sensor configured to measure a first current level through a conductor of the circuit, a voltage sensor configured to measure a first voltage level across a plurality of conductors of the circuit, and a controller communicatively coupled to the current sensor and to the voltage sensor. The controller is configured to receive a first signal from the current sensor, wherein the first signal is representative of the first current level, and receive a second signal from the voltage sensor, wherein the second signal is representative of the first voltage level. Based on the first signal and the second signal, the controller is configured to determine whether to activate a first circuit protection device or a second circuit protection device.Type: GrantFiled: August 23, 2010Date of Patent: February 11, 2014Assignee: General Electric CompanyInventors: George William Roscoe, Robert Caggiano, Henry Hall Mason, Jr., Craig Benjamin Williams
-
Patent number: 8575916Abstract: A power equipment protection system includes a first circuit monitoring device configured to monitor a first circuit, a second circuit monitoring device configured to monitor a second circuit that is electrically coupled to the first circuit, and a processor communicatively coupled to the first circuit monitoring device and the second circuit monitoring device. The processor is configured to receive a signal indicative of a fault from at least one of the first circuit monitoring device and the second circuit monitoring device, determine whether the fault occurred in the first circuit or in the second circuit, and if the fault occurred in the second circuit, determine whether the fault is an arc event.Type: GrantFiled: December 8, 2010Date of Patent: November 5, 2013Assignee: General Electric CompanyInventor: George William Roscoe