Patents by Inventor Chris Houston
Chris Houston has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11270014Abstract: The disclosed computer-implemented method for utilizing metadata for protecting against the sharing of images in a computing network may include (i) identifying an image file stored in a public folder on a computing device, (ii) storing a copy of the image file within a secure data storage application, (iii) encoding metadata for revealing an image in the image file, (iv) performing a security action that protects against sharing the image file from the public folder by masking the image in the image file with the encoded metadata, and (v) rendering the image in the image file as an unmasked version of the image from the image file or the copy of the image file in the secure data storage application by decoding the metadata utilized to mask the image. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: June 6, 2019Date of Patent: March 8, 2022Assignee: CA, Inc.Inventors: Joseph Chen, QuBo Song, Chris Houston
-
Patent number: 10970532Abstract: The disclosed computer-implemented method for preventing sharing of sensitive content in image data on a closed computing platform may include (i) detecting initiation of a network connection for sending network traffic data to a data storage service on the closed computing platform, (ii) monitoring the sending of the network traffic data to identify a target traffic indicator associated with image data, (iii) interrupting the sending of the network traffic data upon identifying the target traffic indicator, (iv) analyzing the image data to identify sensitive content, and (v) performing a security action that protects against the sensitive content being shared to the data storage service on the closed computing platform. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: June 6, 2019Date of Patent: April 6, 2021Assignee: CA, Inc.Inventors: QuBo Song, Joseph Chen, Oksoon Jeong, Zhe Liu, Chris Houston
-
Patent number: 9923897Abstract: An enhanced services network provides enhanced privacy and/or security over public networks to client subscribers of the service. Client devices access the enhanced services network over a public communications network (e.g., the Internet, cellular network, etc.) via a client-side edge server of the enhanced services network. The enhanced services network interfaces with client-requested network resources hosted by third-party server devices via a resource-side edge server. The particular client-side edge server and/or resource-side edge server that is utilized for a particular client session may be selected by the enhanced services network according to a rule set. The rule set may seek to achieve one or more target goals, such as: (1) limit discoverability of the enhanced services network, (2) minimize or reduce geographic/network distance between an edge server and a target computing device, and/or (3) establish connections that are more secure than the connections originally requested by the client.Type: GrantFiled: March 6, 2014Date of Patent: March 20, 2018Assignee: SURFEASY, INC.Inventors: Chris Houston, Athir Nuaimi, Josh Gross
-
Patent number: 9479502Abstract: A rule set for client-applied encryption is created and deployed to a client device by a network device over a communications network. Encryption applied by the client in accordance with the rule set may form the basis of a secure connection in which encrypted information is encapsulated and tunneled across a network that includes a wireless or wired interface through which the client obtains network connectivity. The client may monitor operating conditions, including operating conditions of the communications network, client device, and/or service provider. The rule set includes one or more rules that may be used by the client in combination with the detected operating conditions to select the appropriate encryption protocol. The rule set may persist at the client for use over multiple sessions in which a range of communication protocols and/or access points are used by the client to obtain network connectivity.Type: GrantFiled: April 27, 2015Date of Patent: October 25, 2016Assignee: SURFEASY, INC.Inventors: Chris Houston, Athir Nuaimi
-
Patent number: 9444903Abstract: The present invention is a proxy based network communication system and method that incorporates one or more proxy servers that may be non-static, dynamic proxy servers, operable to automatically identify aspects of a user's network environment and details of the servers in said network and to set-up and configure software to be utilized by a user without user input of details of the user's network environment. These operations of the present invention may be undertaken at a point of user setup and reinitiated upon recognition of a communication problem, The present invention may further be operable to allow a user to access only the part of the network to which the user requires access, and to prevent the user from accessing other parts of the network. The present invention therefore provides a secure environment by implementing changing proxy servers rather than static proxy servers and restricting user access within the network on a need-for-access basis.Type: GrantFiled: June 4, 2012Date of Patent: September 13, 2016Assignee: SURFEASY INC.Inventors: Athir Nuaimi, Chris Houston, Kenneth Rose, Austin Ziegler
-
Publication number: 20160021108Abstract: A rule set for client-applied encryption is created and deployed to a client device by a network device over a communications network. Encryption applied by the client in accordance with the rule set may form the basis of a secure connection in which encrypted information is encapsulated and tunneled across a network that includes a wireless or wired interface through which the client obtains network connectivity. The client may monitor operating conditions, including operating conditions of the communications network, client device, and/or service provider. The rule set includes one or more rules that may be used by the client in combination with the detected operating conditions to select the appropriate encryption protocol. The rule set may persist at the client for use over multiple sessions in which a range of communication protocols and/or access points are used by the client to obtain network connectivity.Type: ApplicationFiled: April 27, 2015Publication date: January 21, 2016Applicant: SURFEASY, INC.Inventors: CHRIS HOUSTON, ATHIR NUAIMI
-
Patent number: 9032206Abstract: A rule set for client-applied encryption is created and deployed to a client device by a network device over a communications network. Encryption applied by the client in accordance with the rule set may form the basis of a secure connection in which encrypted information is encapsulated and tunneled across a network that includes a wireless or wired interface through which the client obtains network connectivity. The client may monitor operating conditions, including operating conditions of the communications network, client device, and/or service provider. The rule set includes one or more rules that may be used by the client in combination with the detected operating conditions to select the appropriate encryption protocol. The rule set may persist at the client for use over multiple sessions in which a range of communication protocols and/or access points are used by the client to obtain network connectivity.Type: GrantFiled: February 25, 2014Date of Patent: May 12, 2015Assignee: Surfeasy, Inc.Inventors: Chris Houston, Athir Nuaimi
-
Publication number: 20140259109Abstract: An enhanced services network provides enhanced privacy and/or security over public networks to client subscribers of the service. Client devices access the enhanced services network over a public communications network (e.g., the Internet, cellular network, etc.) via a client-side edge server of the enhanced services network. The enhanced services network interfaces with client-requested network resources hosted by third-party server devices via a resource-side edge server. The particular client-side edge server and/or resource-side edge server that is utilized for a particular client session may be selected by the enhanced services network according to a rule set. The rule set may seek to achieve one or more target goals, such as: (1) limit discoverability of the enhanced services network, (2) minimize or reduce geographic/network distance between an edge server and a target computing device, and/or (3) establish connections that are more secure than the connections originally requested by the client.Type: ApplicationFiled: March 6, 2014Publication date: September 11, 2014Applicant: SURFEASY, INC.Inventors: CHRIS HOUSTON, ATHIR NUAIMI, JOSH GROSS
-
Publication number: 20140245004Abstract: A rule set for client-applied encryption is created and deployed to a client device by a network device over a communications network. Encryption applied by the client in accordance with the rule set may form the basis of a secure connection in which encrypted information is encapsulated and tunneled across a network that includes a wireless or wired interface through which the client obtains network connectivity. The client may monitor operating conditions, including operating conditions of the communications network, client device, and/or service provider. The rule set includes one or more rules that may be used by the client in combination with the detected operating conditions to select the appropriate encryption protocol. The rule set may persist at the client for use over multiple sessions in which a range of communication protocols and/or access points are used by the client to obtain network connectivity.Type: ApplicationFiled: February 25, 2014Publication date: August 28, 2014Applicant: SURFEASY, INC.Inventors: CHRIS HOUSTON, ATHIR NUAIMI
-
Publication number: 20140122580Abstract: The present invention is a proxy based network communication system and method that incorporates one or more proxy servers that may be non-static, dynamic proxy servers, operable to automatically identify aspects of a user's network environment and details of the servers in said network and to set-up and configure software to be utilized by a user without user input of details of the user's network environment. These operations of the present invention may be undertaken at a point of user setup and reinitiated upon recognition of a communication problem, The present invention may further be operable to allow a user to access only the part of the network to which the user requires access, and to prevent the user from accessing other parts of the network. The present invention therefore provides a secure environment by implementing changing proxy servers rather than static proxy servers and restricting user access within the network on a need-for-access basis.Type: ApplicationFiled: June 4, 2012Publication date: May 1, 2014Applicant: SurfEasy Inc.Inventors: Athir Nuaimi, Chris Houston, Kenneth Rose, Austin Ziegler