Patents by Inventor Robert Snapp

Robert Snapp has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080077804
    Abstract: Systems and methods consistent with the present invention encode a list so users of the list may make inquiries to the coded list without the entire content of the list being revealed to the users. Once each item in the list has been encoded by an encoder, a bit array with high and low values may be used to represent the items in the list. The bit array may be embodied in a validation system for allowing users to query the list to determine whether an inquiry item is on the list. The validation system determines which bits to check by executing the same coding process executed by the encoder. If all the bits are high, then the inquiry item is determined to be part of the list, if at least one bit is low, then the inquiry item is determined not to be part of the original list.
    Type: Application
    Filed: August 20, 2007
    Publication date: March 27, 2008
    Inventors: Robert Snapp, James Wilson
  • Publication number: 20080033885
    Abstract: Systems and methods maintain a database of recipient names and addresses where the delivery point addresses contain secondary address. Data that is stored in the database may be arrayed in secure data tables. The structure of the secure data tables ensures that the data is secure and prevents an unauthorized user from learning address information improperly. A delivery service provider may create secure data tables using 20-byte Secure Hash Algorithm. A software searches secure data tables for the matching recipient name and address. If the match is found, a business sender may receive valid secondary address information for that recipient. If, however, a database does not contain a matching recipient name and address, a business sender may not receive any further information about that recipient's address.
    Type: Application
    Filed: April 17, 2007
    Publication date: February 7, 2008
    Inventors: David Payne, Robert Snapp, James Wilson
  • Publication number: 20070094511
    Abstract: A method and system for efficiently retrieving secured data by securely pre-processing provided access information, provides data store security based on a single piece of access information, which is generally public, such as the proper name of a business or individual that is used to retrieve mailing address information. The access information is hashed for access to a secured data store and efficient access and low data storage for permutations of input access information are provided by verifying the presence of an entry for the hashed access information in a look-up table. If an entry is found, the data store is accessed using the hashed access information, but if an entry is not found, another look-up table corresponding to another information type may be tried or the input access information permuted and retried.
    Type: Application
    Filed: December 14, 2006
    Publication date: April 26, 2007
    Inventors: James Wilson, Robert Snapp, David Payne, Edgar Gillock
  • Publication number: 20060215937
    Abstract: Systems, methods, and software consistent with the present invention use combinations of two or more letters (xgraphs) or characters, such as three letter combinations (trigraphs), to aid in deciphering ambiguous characters in OCR systems. Embodiments consistent with the invention compare possible xgraphs constructed by substitution for the ambiguous OCR-read character(s) to a reference set of xgraphs. The reference set of xgraphs contains predetermined valid xgraphs, which may be ranked by preference. If a possible xgraph matches a reference xgraph, then the ambiguous character(s) are resolved in favor of the characters in the reference xgraph. Embodiments may also use the context of the ambiguous character string to aid in resolving the ambiguity where more than one possible solution exists.
    Type: Application
    Filed: March 28, 2006
    Publication date: September 28, 2006
    Inventor: Robert Snapp
  • Publication number: 20060143434
    Abstract: Systems and methods consistent with the present invention encode a list so users of the list may make inquiries to the coded list without the entire content of the list being revealed to the users. Once each item in the list has been encoded by an encoder, a bit array with high and low values may be used to represent the items in the list. The bit array may be embodied in a validation system for allowing users to query the list to determine whether an inquiry item is on the list. The validation system determines which bits to check by executing the same coding process executed by the encoder. If all the bits are high, then the inquiry item is determined to be part of the list, if at least one of the bits is low, then the inquiry item is determined not to be part of the original list.
    Type: Application
    Filed: September 22, 2005
    Publication date: June 29, 2006
    Inventors: Robert Snapp, James Wilson
  • Publication number: 20060064414
    Abstract: Systems and methods are provided for determining secondary address information. In one implementation, a method is provided that uses a data processing apparatus. According to the method, a code word is created for a business name and a building default extended delivery code. A data table is searched using the code word and secondary address information is revealed when a match is found between the code word and data stored in the data table.
    Type: Application
    Filed: September 12, 2005
    Publication date: March 23, 2006
    Inventors: Robert Snapp, Michael Garner, Edgar Gillock, James Wilson
  • Publication number: 20060031213
    Abstract: A method and system for efficiently retrieving secured data by securely pre-processing provided access information, provides data store security based on only a single piece of access information, which is generally public, such as the proper name of a business or individual that is used to retrieve mailing address information. The access information is hashed for access to a secured data store and efficient access and low data storage for permutations of input access information are provided by verifying the presence of an entry for the hashed access information in a look-up table. If an entry is found, the data store is accessed using the hashed access information, but if an entry is not found, another look-up table corresponding to another information type may be tried or the input access information permuted and retried.
    Type: Application
    Filed: September 27, 2005
    Publication date: February 9, 2006
    Inventors: James Wilson, Robert Snapp, David Payne, Edgar Gillock
  • Publication number: 20060020575
    Abstract: A method and system for storing and retrieving data using hash-accessed multiple data stores, provides data protection while requiring low computational overhead and further provides storage and retrieval access based on only a single piece of access information, which is generally public. The algorithms provide high security against data-mining and other examination of the data stores. The access information is hashed and is split into offset fields used as indices into a plurality of data stores, generating a quasi-random relationship between the access information and the location of portions of a stored data element. Further protection may be provided by striping the data across the data stores in conformity with a striping order selected by a field of the hashed access information.
    Type: Application
    Filed: September 22, 2005
    Publication date: January 26, 2006
    Inventors: Robert Snapp, David Payne, James Wilson
  • Publication number: 20050197966
    Abstract: Systems and methods maintain a database of recipient names and addresses where the delivery point addresses contain secondary address. Data that is stored in the database may be arrayed in secure data tables. The structure of the secure data tables ensures that the data is secure and prevents an unauthorized user from learning address information improperly. A delivery service provider may create secure data tables using 20-byte Secure Hash Algorithm. A software searches secure data tables for the matching recipient name and address. If the match is found, a business sender may receive valid secondary address information for that recipient. If, however, a database does not contain a matching recipient name and address, a business sender may not receive any further information about that recipient's address.
    Type: Application
    Filed: September 30, 2004
    Publication date: September 8, 2005
    Inventors: David Payne, Robert Snapp, James Wilson
  • Publication number: 20050021481
    Abstract: Systems and methods for providing an alternative delivery point code may comprise receiving delivery data corresponding to a delivery point. Furthermore, the systems and methods may include determining if the delivery data includes a secondary element. Moreover, the systems and methods may include creating the alternative delivery point code based upon the secondary element if the delivery data includes the secondary element. The secondary element may comprise a descriptor or a secondary number associated with the delivery point. If the delivery data does not include the secondary element, a normal delivery point code may be created.
    Type: Application
    Filed: April 9, 2004
    Publication date: January 27, 2005
    Inventors: Robert Snapp, Michael Garner, James Wilson, David Payne