Patents by Inventor Carson Kaan
Carson Kaan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8370646Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: GrantFiled: September 25, 2009Date of Patent: February 5, 2013Assignee: xSides CorporationInventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
-
Publication number: 20120237029Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” and “replace and restore.Type: ApplicationFiled: May 1, 2012Publication date: September 20, 2012Inventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
-
Publication number: 20110221765Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces in addition to the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.Type: ApplicationFiled: September 14, 2010Publication date: September 15, 2011Applicant: xSides CorporationInventors: D. David Nason, Carson Kaan
-
Publication number: 20100077231Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: September 25, 2009Publication date: March 25, 2010Inventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
-
Publication number: 20100077360Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: September 25, 2009Publication date: March 25, 2010Inventors: D. DAVID NASON, CARSON KAAN, JOHN E. EASTON, JASON M. SMITH, JOHN A. PAINTER, WILLIAM J. HEATON
-
Publication number: 20100005396Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces in addition to the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.Type: ApplicationFiled: June 5, 2009Publication date: January 7, 2010Inventors: D. David Nason, Carson Kaan
-
Patent number: 7340682Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces adjacent the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.Type: GrantFiled: May 9, 2003Date of Patent: March 4, 2008Assignee: xSides CorporationInventors: D. David Nason, J. Scott Campbell, Phillip Brooks, Carson Kaan, Thomas C. O'Rourke, James Warnock, John Easton
-
Patent number: 7007025Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: GrantFiled: June 10, 2002Date of Patent: February 28, 2006Assignee: xSides CorporationInventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
-
Publication number: 20050204165Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: February 11, 2005Publication date: September 15, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050149485Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: January 25, 2005Publication date: July 7, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050149486Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: January 25, 2005Publication date: July 7, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050108525Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: December 10, 2004Publication date: May 19, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050102266Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: December 10, 2004Publication date: May 12, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050102264Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: November 18, 2004Publication date: May 12, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050086666Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: November 18, 2004Publication date: April 21, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20040032423Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces adjacent the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.Type: ApplicationFiled: May 9, 2003Publication date: February 19, 2004Applicant: xSides CorporationInventors: D. David Nason, J. Scott Campbell, Phillip Brooks, Carson Kaan, Thomas C. O'Rourke, James Warnock, John Easton
-
Publication number: 20040027387Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces adjacent the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.Type: ApplicationFiled: May 9, 2003Publication date: February 12, 2004Applicant: xSides CorporationInventors: D. David Nason, J. Scott Campbell, Phillip Brooks, Carson Kaan, Thomas C. O'Rourke, James Warnock, John Easton
-
Patent number: 6639613Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system monitor. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces adjacent the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.Type: GrantFiled: August 4, 1999Date of Patent: October 28, 2003Assignee: xSides CorporationInventors: D David Nason, John Easton, Carson Kaan, Philip Brooks
-
Patent number: 6630943Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces adjacent the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.Type: GrantFiled: September 20, 2000Date of Patent: October 7, 2003Assignee: xSides CorporationInventors: D. David Nason, J. Scott Campbell, Phillip Brooks, Carson Kaan, Thomas C. O'Rourke, James Warnock, John Easton
-
Patent number: 5758028Abstract: A fuzzy logic load management controller for use with a computer image generator. The load management controller is used use with a computer image generator having a plurality of inputs and a plurality of outputs, and includes an adder that couples inputs to the image generator. The load management controller comprises a fuzzy logic controller disposed in a feedback loop between the output of the image generator and the adder. The load management controller includes a fuzzy logic inference engine, a set of membership functions coupled to the inference engine, and a rules database coupled to the inference engine that includes a set of if-then rules that specify the response of the fuzzy logic controller to inputs applied thereto. The fuzzy logic controller provides for load management of the image generator that gracefully degrades a viewed scene, keeps the image update rate constant, and renders important objects in the viewed scene.Type: GrantFiled: September 1, 1995Date of Patent: May 26, 1998Assignee: Lockheed Martin Aerospace CorporationInventors: Carson Kaan, Annette Janett, David Bakeman, Kent Cauble, Dale Miller