Patents by Inventor Eric Gilbertson

Eric Gilbertson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10769288
    Abstract: In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
    Type: Grant
    Filed: March 12, 2019
    Date of Patent: September 8, 2020
    Assignee: INTELLECTUAL PROPERTY VENTURES I LLC
    Inventors: Denis Jacques Paul Garcia, Michael Michio Ouye, Alain Rossmann, Steven Toye Crocker, Eric Gilbertson, Weiqing Huang, Serge Humpich, Klimenty Vainstein, Nicholas Michael Ryan
  • Publication number: 20190311146
    Abstract: In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
    Type: Application
    Filed: March 12, 2019
    Publication date: October 10, 2019
    Applicant: INTELLECTUAL VENTURES I LLC
    Inventors: Denis Jacques Paul GARCIA, Michael Michio OUYE, Alain ROSSMANN, Steven Toye CROCKER, Eric GILBERTSON, Weiqing HUANG, Serge HUMPICH, Klimenty VAINSTEIN, Nicholas Michael RYAN
  • Patent number: 10229279
    Abstract: In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
    Type: Grant
    Filed: January 10, 2017
    Date of Patent: March 12, 2019
    Assignee: INTELLECTUAL VENTURES I LLC
    Inventors: Denis Jacques Paul Garcia, Michael Michio Ouye, Alain Rossmann, Steven Toye Crocker, Eric Gilbertson, Weiqing Huang, Serge Humpich, Klimenty Vainstein, Nicholas Michael Ryan
  • Publication number: 20170213045
    Abstract: In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
    Type: Application
    Filed: January 10, 2017
    Publication date: July 27, 2017
    Applicant: INTELLECTUAL VENTURES I LLC
    Inventors: Denis Jacques Paul GARCIA, Michael Michio OUYE, Alain ROSSMANN, Steven Toye CROCKER, Eric GILBERTSON, Weiqing HUANG, Serge HUMPICH, Klimenty VAINSTEIN, Nicholas Michael RYAN
  • Patent number: 9542560
    Abstract: In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
    Type: Grant
    Filed: September 23, 2013
    Date of Patent: January 10, 2017
    Assignee: Intellectual Ventures I LLC
    Inventors: Denis Jacques Paul Garcia, Michael Michio Ouye, Alain Rossmann, Steven Toye Crocker, Eric Gilbertson, Weiqing Huang, Serge Humpich, Klimenty Vainstein, Nicholas Michael Ryan
  • Patent number: 9129120
    Abstract: In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
    Type: Grant
    Filed: March 18, 2014
    Date of Patent: September 8, 2015
    Assignee: INTELLECTUAL VENTURES I LLC
    Inventors: Denis Jacques Paul Garcia, Michael Michio Ouye, Alain Rossmann, Steven Toye Crocker, Eric Gilbertson, Weiqing Huang, Serge Humpich, Klimenty Vainstein, Nicholas Michael Ryan
  • Publication number: 20150116944
    Abstract: An electrical assembly that includes a circuit board, an electrical device, a heat spreader, and a solder sphere. The electrical device is a surface mount type package attached to the circuit board. The heat spreader overlies and extends beyond the outline of the device, and is in thermal contact the top side of the surface mount type package. A contact surface of the heat spreader is spaced apart from a mounting surface of the circuit board by a distance based on a height of the top side above the mounting surface. The solder sphere has a pre-reflow diameter sufficient to couple the contact surface to the mounting surface after the solder sphere is reflowed.
    Type: Application
    Filed: October 29, 2013
    Publication date: April 30, 2015
    Inventors: ROBERT L. VADAS, KURT ERIC GILBERTSON
  • Publication number: 20140201850
    Abstract: In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
    Type: Application
    Filed: March 18, 2014
    Publication date: July 17, 2014
    Applicant: INTELLECTUAL VENTURES I LLC
    Inventors: Denis Jacques Paul GARCIA, Michael Michio Ouye, Alain Rossmann, Steven Toye Crocker, Eric Gilbertson, Weiqing Huang, Serge Humpich, Klimenty Vainstein, Nicholas Michael Ryan
  • Publication number: 20140075206
    Abstract: In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
    Type: Application
    Filed: September 23, 2013
    Publication date: March 13, 2014
    Applicant: Intellectual Ventures I LLC
    Inventors: Denis Jacques Paul Garcia, Micheal Michio Ouye, Alain Rossmann, Steven Toye Crocker, Eric Gilbertson, Weiqing Huang, Serge Humpich, Klimenty Vainstein, Nicholas Micheal Ryan
  • Patent number: 8543827
    Abstract: In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
    Type: Grant
    Filed: March 27, 2008
    Date of Patent: September 24, 2013
    Assignee: Intellectual Ventures I LLC
    Inventors: Denis Jacques Paul Garcia, Michael Michio Ouye, Alain Rossmann, Steven Toye Crocker, Eric Gilbertson, Weiqing Huang, Serge Humpich, Klimenty Vainstein, Nicholas Michael Ryan
  • Publication number: 20130003336
    Abstract: An interposer for connecting two or more circuit boards is a circuit carrying substrate with two or more solder pads on each of two sides. Each of the solder pads are connected to an electrically conductive via in the substrate, providing electrical interconnection from one side to the other side. One or more solder pads have a solder ball on it. The interposer has a contact area suitable for the interposer to be picked up and placed by an automated part placement machine. An electrical assembly is made by soldering the solder balls on one side of the interposer to corresponding solder pads on a circuit board. The solder balls on the other side of the interposer are likewise soldered to the corresponding solder pads of a second circuit board.
    Type: Application
    Filed: June 28, 2011
    Publication date: January 3, 2013
    Applicant: DELPHI TECHNOLOGIES, INC.
    Inventors: ROY A. VISSER, ROBERT L. VADAS, KURT ERIC GILBERTSON, MICHAEL J. PEPPLES
  • Publication number: 20100182765
    Abstract: An RF/EMI shield has a planar conductive element and a plurality of solder spheres extending around the edges making electrical and mechanical contact with the conductive element to form a shield which can be soldered in a surface mount process directly over components needing shielding. The solder spheres have a diameter sufficient to provide the desired clearance between the shielding element and the component being shielded and a melting temperature equivalent to existing solder contacts to which the shield is bonded.
    Type: Application
    Filed: January 21, 2009
    Publication date: July 22, 2010
    Applicant: DELPHI TECHNOLOGIES, INC.
    Inventors: Robert L. Vadas, Timothy Arthur Eldon, Scott E. Post, Kurt Eric Gilbertson
  • Publication number: 20090100268
    Abstract: In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header, and an encrypted document or data portion. The header includes security information that points to or includes the access rules and a file key. The access rules facilitate restrictive access to the secured document and essentially determine who/when/how/where the secured document can be accessed. The file key is used to encrypt/decrypt the encrypted data portion. Only those who have the proper access privileges are permitted to retrieve the file key to encrypt/decrypt the encrypted data portion.
    Type: Application
    Filed: March 27, 2008
    Publication date: April 16, 2009
    Applicant: Guardian Data Storage, LLC
    Inventors: Denis Jacques Paul GARCIA, Michael Michio OUYE, Alain ROSSMANN, Steven Toye CROCKER, Eric GILBERTSON, Weiqing HUANG, Serge HUMPICH, Klimenty VAINSTEIN, Nicholas Michael RYAN
  • Patent number: 6820080
    Abstract: Methods, systems and articles of manufacture are provided for setting a state of triggers between operative and inoperative. In an operative state the trigger may be called during triggering I/O operations such as Insert, Update and Delete. The inoperative state indicates that the system has detected a condition requiring user intervention. In a particular embodiment, a database management system (DBMS) will analyze the function being performed on a table (such as a rename of the table) and with dependent object data, the DBMS will determine if the trigger is self-referencing. If so, the trigger made inoperative. Making the trigger inoperative and requiring user intervention prevents the system from potentially producing undesired results. In another embodiment, a determination of dependency is made upon receiving a database command to affect an object. According to the type of command, the object and its dependents are either affected or unaffected.
    Type: Grant
    Filed: March 26, 2001
    Date of Patent: November 16, 2004
    Assignee: International Business Machines Corporation
    Inventors: Mark John Anderson, Kevin Robert Brettin, Russell Edward Bruhnke, Kyle Eric Gilbertson, Ritchie Lee Nyland, Richard Donald Parrott, Kathy Lynn Passe, Randy Keith Rolfe, Susan Liisa Romano, Renee Kristin Saxman, Kathryn Rose Steinbrink, Mark William Theuer, Jonathan Lee Triebenbach, Michael Alan Venz, Jane Ann Vold
  • Publication number: 20030154381
    Abstract: Techniques for managing access to digital assets via a designated place or its sub-places are disclosed. The designated place may be a file folder, a directory, a local or remote store. The designated place is characterized by or associated with a securing module that causes all files stored in the designated place to have substantially similar security. In other words, a file to be secured can be simply dropped into the designated place and the securing module is configured to take actions to secure the file transparently in accordance with the security characteristics of the designated place. Likewise, a designated place can be set up to unsecure the secured files being deposited in the designated place, provided a user of the secured files is permitted to do so.
    Type: Application
    Filed: September 27, 2002
    Publication date: August 14, 2003
    Applicant: Pervasive Security Systems, Inc.
    Inventors: Michael Michio Ouye, Alain Rossmann, Steven Toye Crocker, Eric Gilbertson, Weiqing Huang, Denis Jacques Paul Garcia, Serge Humpich, Klimenty Vainstein, Nicholas Michael Ryan
  • Publication number: 20020184207
    Abstract: Methods, systems and articles of manufacture are provided for setting a state of triggers between operative and inoperative. In an operative state the trigger may be called during triggering I/O operations such as Insert, Update and Delete. The inoperative state indicates that the system has detected a condition requiring user intervention. In a particular embodiment, a database management system (DBMS) will analyze the function being performed on a table (such as a rename of the table) and with dependent object data, the DBMS will determine if the trigger is self-referencing. If so, the trigger made inoperative. Making the trigger inoperative and requiring user intervention prevents the system from potentially producing undesired results.
    Type: Application
    Filed: March 26, 2001
    Publication date: December 5, 2002
    Applicant: International Business Machines Corporation
    Inventors: Mark John Anderson, Kevin Robert Brettin, Russell Edward Bruhnke, Kyle Eric Gilbertson, Ritchie Lee Nyland, Richard Donald Parrott, Kathy Lynn Passe, Randy Keith Rolfe, Susan Liisa Romano, Renee Kristin Saxman, Kathryn Rose Steinbrink, Mark William Theuer, Jonathan Lee Triebenbach, Michael Alan Venz, Jane Ann Vold