Patents by Inventor Terry D. Shaw

Terry D. Shaw has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8060648
    Abstract: A method and system of allocating data for subsequent retrieval. The method and system optionally including allocating data to a plurality of devices for storage, associating the data with the device providing the storage thereof, and providing retrieval information to facilitate retrieval of the data as function of the devices associated with the storage thereof. The method and system may further include features for controlling information associated with the allocated and/or features for associated one or more pieces of metadata to control access to allocated data once retrieved.
    Type: Grant
    Filed: August 31, 2005
    Date of Patent: November 15, 2011
    Assignee: Cable Television Laboratories, Inc.
    Inventors: Yasser F. Syed, Terry D. Shaw, David P. Reed
  • Publication number: 20040199789
    Abstract: The present anonymizer data collection device includes a suitable encryption process for encrypting a permanent identifier assigned to the subscriber or the subscriber equipment to produce an encrypted identifier. Information relating to the subscriber's data use of the network is collected and tagged with the encrypted identifier to protect the identity of the individuals from which the data are collected.
    Type: Application
    Filed: December 30, 2002
    Publication date: October 7, 2004
    Inventors: Terry D. Shaw, Simon L. Krauss
  • Publication number: 20040068559
    Abstract: The method for detecting unauthorized computer system usage monitors the subscriber's activities while using the computer system, the system activities and the Internet activities. When the computer system is initialized, the subscriber may manually or automatically set parameters for determining when an activity is unauthorized. When an activity is detected with deviates from normal system usage and operation, the activity is unauthorized. The unauthorized activity may be recorded in an activity log, may be terminated by the computer system, or the subscriber may be notified of the unauthorized usage.
    Type: Application
    Filed: October 4, 2002
    Publication date: April 8, 2004
    Inventor: Terry D. Shaw