Patents Assigned to xSide Corporation
-
Patent number: 8370646Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: GrantFiled: September 25, 2009Date of Patent: February 5, 2013Assignee: xSides CorporationInventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
-
Publication number: 20110221765Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces in addition to the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.Type: ApplicationFiled: September 14, 2010Publication date: September 15, 2011Applicant: xSides CorporationInventors: D. David Nason, Carson Kaan
-
Publication number: 20110096081Abstract: A computer display controller arbitrates between multiple environments in a computer system to apportion display space between the multiple environments. The display controller may be implemented in hardware, firmware, or software, and determines display space allocation based on requests or requirements of each of the environments. If only one environment is active, the display controller may allocate the entire display space to the first environment. When a second environment is activated, display parameters may be dynamically provided to the display controller or previously provided to the display controller for storage and subsequent use. The display controller apportions the total displayable area to accommodate both environments and if necessary alters the display parameters of the first environment to accommodate the display needs of the second environment The process may be extended to additional environments and may operate satisfactorily with computer systems having multiple displays.Type: ApplicationFiled: January 5, 2011Publication date: April 28, 2011Applicant: xSides CorporationInventors: Jason M. Smith, D. David Nason
-
Publication number: 20100207971Abstract: A method for creating and accessing a graphical user interface in the overscan area outside the area of the display normally utilized by the common operating systems. This normal display area is generally known as the “desktop”. The desktop serves as a graphical user interface to the operating system. The desktop displays images representing files, documents and applications available to the user. The desktop is restricted in the common environments to a predetermined set of resolutions (e.g., 640×480, 800×600, 1024×768) as defined by VGA and SVGA standards. Displayable borders outside this area are the overscan area.Type: ApplicationFiled: April 27, 2010Publication date: August 19, 2010Applicant: xSides CorporationInventors: David D. Nason, Thomas C. O'Rourke, Scott J. Campbell
-
Publication number: 20100064245Abstract: A computer display controller arbitrates between multiple environments in a computer system to apportion display space between the multiple environments. The display controller may be implemented in hardware, firmware, or software, and determines display space allocation based on requests or requirements of each of the environments. If only one environment is active, the display controller may allocate the entire display space to the first environment. When a second environment is activated, display parameters may be dynamically provided to the display controller or previously provided to the display controller for storage and subsequent use. The display controller apportions the total displayable area to accommodate both environments and if necessary alters the display parameters of the first environment to accommodate the display needs of the second environment. The process may be extended to additional environments and may operate satisfactorily with computer systems having multiple displays.Type: ApplicationFiled: September 4, 2009Publication date: March 11, 2010Applicant: xSides CorporationInventors: Jason M. Smith, D. David Nason
-
Patent number: 7340682Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces adjacent the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.Type: GrantFiled: May 9, 2003Date of Patent: March 4, 2008Assignee: xSides CorporationInventors: D. David Nason, J. Scott Campbell, Phillip Brooks, Carson Kaan, Thomas C. O'Rourke, James Warnock, John Easton
-
Publication number: 20060050013Abstract: A method for creating and accessing a graphical user interface in the overscan area outside the area of the display normally visible to users of the common operating systems. This normal display area is generally known as the “desktop”. The desktop serves as the graphical user interface to the operating system. The desktop displays images representing documents and applications available to the user (icons). The desktop is restricted in the common environments to a predetermined set of resolutions (e.g., 640×480, 800×600, 1024×768) as defined by VGA and SuperVGA standards. Displayable borders outside this area are the overscan.Type: ApplicationFiled: September 1, 2005Publication date: March 9, 2006Applicant: xSides CorporationInventors: D. Nason, Thomas O'Rourke, J. Campbell
-
Patent number: 7007025Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: GrantFiled: June 10, 2002Date of Patent: February 28, 2006Assignee: xSides CorporationInventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
-
Patent number: 6966036Abstract: A method for creating and accessing a graphical user interface in the overscan area outside the area of the display normally visible to users of the common operating systems. This normal display area is generally known as the “desktop”. The desktop serves as the graphical user interface to the operating system. The desktop displays images representing documents and applications available to the user (icons). The desktop is restricted in the common environments to a predetermined set of resolutions (e.g., 640×480, 800×600, 1024×768) as defined by VGA and SuperVGA standards. Displayable borders outside this area are the overscan.Type: GrantFiled: April 1, 2002Date of Patent: November 15, 2005Assignee: xSides CorporationInventors: D. David Nason, Thomas C. O'Rourke, J. Scott Campbell
-
Publication number: 20050204165Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: February 11, 2005Publication date: September 15, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050149485Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: January 25, 2005Publication date: July 7, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050149486Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: January 25, 2005Publication date: July 7, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050108525Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: December 10, 2004Publication date: May 19, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050102266Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: December 10, 2004Publication date: May 12, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050102264Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: November 18, 2004Publication date: May 12, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Patent number: 6892359Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces in addition to the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.Type: GrantFiled: November 28, 2000Date of Patent: May 10, 2005Assignee: xSide CorporationInventors: D. David Nason, Volodymyr Syedach, John R. Kennedy
-
Publication number: 20050086666Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: November 18, 2004Publication date: April 21, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050052473Abstract: A method for creating and accessing a graphical user interface in the overscan area outside the area of the display normally utilized by the common operating systems. This normal display area is generally known as the “desktop”. The desktop serves as a graphical user interface to the operating system. The desktop displays images representing files, documents and applications available to the user. The desktop is restricted in the common environments to a predetermined set of resolutions (e.g., 640×480, 800×600, 1024×768) as defined by VGA and SVGA standards. Displayable borders outside this area are the overscan area.Type: ApplicationFiled: October 21, 2004Publication date: March 10, 2005Applicant: xSides CorporationInventors: D. Nason, Thomas O'Rourke, J. Campbell
-
Patent number: 6828991Abstract: A method for creating and accessing a graphical user interface in the overscan area outside the area of the display normally utilized by the common operating systems. This normal display area is generally known as the “desktop”. The desktop serves as a graphical user interface to the operating system. The desktop displays images representing files, documents and applications available to the user. The desktop is restricted in the common environments to a predetermined set of resolutions (e.g., 640×480, 800×600, 1024×768) as defined by VGA and SVGA standards. Displayable borders outside this area are the overscan area.Type: GrantFiled: September 21, 2001Date of Patent: December 7, 2004Assignee: xSides CorporationInventors: David D Nason, Thomas C O'Rourke, Scott J Campbell
-
Publication number: 20040226041Abstract: A computer display controller arbitrates between multiple environments in a computer system to apportion display space between the multiple environments. The display controller may be implemented in hardware, firmware, or software, and determines display space allocation based on requests or requirements of each of the environments. If only one environment is active, the display controller may allocate the entire display space to the first environment. When a second environment is activated, display parameters may be dynamically provided to the display controller or previously provided to the display controller for storage and subsequent use. The display controller apportions the total displayable area to accommodate both environments and if necessary alters the display parameters of the first environment to accommodate the display needs of the second environment. The process may be extended to additional environments and may operate satisfactorily with computer systems having multiple displays.Type: ApplicationFiled: June 9, 2004Publication date: November 11, 2004Applicant: xSides CorporationInventors: Jason M. Smith, D. David Nason