Patents by Inventor Jeffrey L. Crandell

Jeffrey L. Crandell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150186634
    Abstract: One or more biometric templates can be stored for a user. The user can access a verification system by scanning biometric data, such as a fingerprint or iris scan, into a biometric reader. A biometric access system can determine whether the scanned biometric data matches one of the biometric templates of the user. If so, then the user may be permitted access to the verification system. The verification system can accept user input from one or more input devices, such as a keyboard, mouse, touchscreen, combinations of the same, or the like. The verification system can programmatically analyze the user input and output one or more reports for presentation to other users.
    Type: Application
    Filed: December 30, 2014
    Publication date: July 2, 2015
    Inventors: Jeffrey L. Crandell, John M. Shanahan
  • Patent number: 8516558
    Abstract: An exemplary authentication method includes sending a polling inquiry to an authentication module, identifying a passive notification sent from the authentication module in response to the inquiry, accepting authentication credentials in response to the passive notification, and transmitting authentication information based on the authentication credentials to the authentication module. An exemplary authentication system includes a remote server in communication with a client computer and hosting an access control module. An authentication server is in communication with the remote server and hosts an authentication module.
    Type: Grant
    Filed: February 23, 2009
    Date of Patent: August 20, 2013
    Inventor: Jeffrey L. Crandell
  • Patent number: 8483371
    Abstract: A system and method for managing incoming and outgoing communications may include a definition of if, when, and who may communicate with a recipient. The identification of the communication may be concealed in that no actual addresses, phone numbers, or other addressing identifications are required to be exchanged by the communication initiator and recipient. In an example, if the database contains call management settings for a call recipient, the application logic may evaluate the rules to determine if a particular caller is authorized to connect with the call recipient at the current time and date. The application logic may connect the call utilizing the public telephone switch. The caller and call recipient phone numbers may be stored in a database.
    Type: Grant
    Filed: September 23, 2011
    Date of Patent: July 9, 2013
    Inventors: Jeffrey L. Crandell, Brian K. Wharton
  • Publication number: 20120137009
    Abstract: A system and method for managing incoming and outgoing communications may include a definition of if, when, and who may communicate with a recipient. The identification of the communication may be concealed in that no actual addresses, phone numbers, or other addressing identifications are required to be exchanged by the communication initiator and recipient. In an example, if the database contains call management settings for a call recipient, the application logic may evaluate the rules to determine if a particular caller is authorized to connect with the call recipient at the current time and date. The application logic may connect the call utilizing the public telephone switch. The caller and call recipient phone numbers may be stored in a database.
    Type: Application
    Filed: September 23, 2011
    Publication date: May 31, 2012
    Inventors: Jeffrey L. Crandell, Brian K. Wharton
  • Patent number: 8027442
    Abstract: An apparatus, system and method for managing incoming and outgoing communications for various communications methods are disclosed to provide control over inbound communications including definition of if, when, and who may communicate with a recipient, A concealed identification communication may involve no exchange of actual addresses, phone numbers, or other addressing IDs The capability to initiate immediate, delayed, scheduled, or recurring outbound communications is also discussed.
    Type: Grant
    Filed: April 13, 2007
    Date of Patent: September 27, 2011
    Inventors: Jeffrey L. Crandell, Brian K. Wharton
  • Patent number: 8015116
    Abstract: A method for managing access to application software contained on a computer system or network. The computer system utilizes an authentication component that is configured to receive a unique user account identifier and to generate an authentication passkey by using an identifying data element, typically called a “password”. The identifying data elements are collected from one or more input devices and used as an encryption key for the user account identifier. The generated authentication passkey is used in an authentication transaction associated with the application software instead of the identifying data element thereby reducing data security risks if the identifying data element alone were discovered due to other unknowns including the encryption elements.
    Type: Grant
    Filed: January 20, 2006
    Date of Patent: September 6, 2011
    Assignee: Newport Scientific Research LLC
    Inventor: Jeffrey L. Crandell
  • Publication number: 20090300737
    Abstract: An exemplary system includes a plurality of storage devices storing at least one of a plurality of chunks of a template. A first chunk is stored in a first location and a second chunk is stored in a second location. The system further includes a client device in communication with the storage devices. Each client device includes a verification module that divides the template into the plurality of chunks, and reconstitutes the plurality of chunks into the template during validation. A method includes generating the template based upon an enrollment biometric identifier, dividing the template into the plurality of chunks, storing at least one of the plurality of chunks in a first storage location, and storing at least another of the plurality of chunks in a second storage location.
    Type: Application
    Filed: May 26, 2009
    Publication date: December 3, 2009
    Inventor: Jeffrey L. Crandell
  • Publication number: 20090300356
    Abstract: An exemplary remote storage encryption system includes a data storage unit and a key server having a key management module configured to communicate with a client device. The key management module stores at least one key access map that maps at least one access credential to at least one encryption key to determine which encryption key to provide to the client device. An exemplary method includes mapping the at least one access credential to the at least one encryption key, receiving a request for the encryption key from a remote requestor, accepting the access credential with the request, validating the access credential against a previously stored version thereof, retrieving the encryption key associated with the access credential based on the mapping, and sending the key to the remote requester.
    Type: Application
    Filed: May 26, 2009
    Publication date: December 3, 2009
    Inventor: Jeffrey L. Crandell
  • Publication number: 20090248966
    Abstract: An exemplary data storage device includes a fixed storage medium, an expansion socket configured to selectively receive at least one removable memory card, and a controller configured to interface the fixed storage medium and the at least one removable memory card with a host device. An exemplary method includes verifying credentials with verification data stored on the fixed storage medium of the data storage unit, and protecting data on the removable storage medium removably attached to the data storage unit.
    Type: Application
    Filed: March 16, 2009
    Publication date: October 1, 2009
    Inventor: Jeffrey L. Crandell
  • Publication number: 20090240907
    Abstract: An authorization method includes recognizing a request to access a data storage unit from a user, providing user identification and identifying information of the data storage unit, receiving a response from the authorization module, and passing the request to the data storage unit if the user is authorized to access the data storage unit. An access control system includes the authorization module configured to receive the request to access the data storage unit from the client device and determine whether the user is authorized to access the data storage unit.
    Type: Application
    Filed: March 16, 2009
    Publication date: September 24, 2009
    Inventor: Jeffrey L. Crandell
  • Publication number: 20090217361
    Abstract: An exemplary authentication method includes sending a polling inquiry to an authentication module, identifying a passive notification sent from the authentication module in response to the inquiry, accepting authentication credentials in response to the passive notification, and transmitting authentication information based on the authentication credentials to the authentication module. An exemplary authentication system includes a remote server in communication with a client computer and hosting an access control module. An authentication server is in communication with the remote server and hosts an authentication module.
    Type: Application
    Filed: February 23, 2009
    Publication date: August 27, 2009
    Inventor: Jeffrey L. Crandell
  • Publication number: 20080172341
    Abstract: A method for managing access to application software contained on a computer system or network. The computer system utilizes an authentication component that is configured to receive a unique user account identifier and to generate an authentication passkey by using an identifying data element, typically called a “password”. The identifying data elements are collected from one or more input devices and used as an encryption key for the user account identifier. The generated authentication passkey is used in an authentication transaction associated with the application software instead of the identifying data element thereby reducing data security risks if the identifying data element alone were discovered due to other unknowns including the encryption elements.
    Type: Application
    Filed: January 20, 2006
    Publication date: July 17, 2008
    Applicant: Innovative Inventions, Inc.
    Inventor: Jeffrey L. Crandell
  • Publication number: 20040240642
    Abstract: The present invention provides apparatus, systems and methods for managing incoming and outgoing communications for various communications methods. The invention provides control over inbound communications including definition of if, when, and who may communicate with a recipient. The invention also supports concealed identification communication in that no actual addresses, phone numbers, or other addressing IDs are required to be exchanged by the communication initiator and recipient The invention also provides the capability to initiate immediate, delayed, scheduled, or recurring outbound communications. As depicted in FIG. 1, if the database (45) contains call management settings for a call recipient, the application logic (40) will evaluate the rules to determine if a particular caller is authorized to connect with the call recipient at the current time and date.
    Type: Application
    Filed: December 17, 2003
    Publication date: December 2, 2004
    Inventors: Jeffrey L. Crandell, Brian K. Wharton