Patents by Inventor William Andruss

William Andruss has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8443445
    Abstract: Scanning is disclosed. A system is monitored to detect object events. A risk level is determined for an object event, and a scan is scheduled for an object associated with the object event according to the risk level. The risk level may be based on the risk level of the object type, and on the risk level of the operation. An immediate on access scan may be scheduled for a first risk range, a differential scan may be scheduled for a second risk range, and an incremental scan may be scheduled for a third risk range. The scheduled scan is performed.
    Type: Grant
    Filed: June 28, 2006
    Date of Patent: May 14, 2013
    Assignee: EMC Corporation
    Inventors: William Andruss, Christopher Claudatos, Bruce Leetch, Steven Terwilliger
  • Patent number: 8296855
    Abstract: Content processing is disclosed. An indication that a sender desires to send encrypted content to a destination is received. An agreement is obtained from the sender to provide an access key to a node other than the destination and to encrypt content sent to the destination using an encryption key selected such that the access key is usable to decrypt the content.
    Type: Grant
    Filed: December 13, 2010
    Date of Patent: October 23, 2012
    Assignee: EMC Corporation
    Inventors: Christopher Hercules Claudatos, William Andruss, Bruce Leetch, Jeffrey K. Porter
  • Patent number: 8079091
    Abstract: Performing compliance processing is disclosed. An indication is received that compliance processing is to be performed with respect to content that is subject to an access restriction that would prevent the compliance processing from being performed if the content were not able to be accessed without the restriction. It is ensured that the content can be accessed without the restriction to perform the compliance processing.
    Type: Grant
    Filed: August 17, 2006
    Date of Patent: December 13, 2011
    Assignee: EMC Corporation
    Inventors: Christopher Hercules Claudatos, William Andruss, Bruce Leetch, Jeffrey K. Porter
  • Publication number: 20110083197
    Abstract: Content processing is disclosed. An indication that a sender desires to send encrypted content to a destination is received. An agreement is obtained from the sender to provide an access key to a node other than the destination and to encrypt content sent to the destination using an encryption key selected such that the access key is usable to decrypt the content.
    Type: Application
    Filed: December 13, 2010
    Publication date: April 7, 2011
    Applicant: EMC Corporation
    Inventors: Christopher Hercules Claudatos, William Andruss, Bruce Leetch, Jeffrey K. Porter
  • Patent number: 7874012
    Abstract: Content processing is disclosed. An indication that a sender desires to send encrypted content to a destination is received. An agreement is obtained from the sender to provide an access key to a node other than the destination and to encrypt content sent to the destination using an encryption key selected such that the access key is usable to decrypt the content.
    Type: Grant
    Filed: October 24, 2006
    Date of Patent: January 18, 2011
    Assignee: EMC Corporation
    Inventors: Christopher Hercules Claudatos, William Andruss, Bruce Leetch, Jeffrey K. Porter
  • Publication number: 20080001753
    Abstract: A method, article of manufacture, and apparatus for inventory control of items in a location are disclosed. In an embodiment, this comprises a surveillance system comprising a plurality of cameras and at least one display, at least one identification tag, at least one identification tag reader configured to read the identification tag and placed to cover at least a portion of the location, and a computer configured to process information including the identification tag read by the reader. In response to the information, the computer controls a video camera to display an image showing an area around the identification tag. This may be based on a determination of heightened risk, such as when the identification tag is associated with a receipt and is brought back to the location after being removed from the location.
    Type: Application
    Filed: June 11, 2007
    Publication date: January 3, 2008
    Inventors: Christopher Claudatos, William Andruss
  • Publication number: 20070071213
    Abstract: Processing data messages is disclosed. A data message or a copy thereof is sent to a destination other than an intended recipient with which the data message is associated, for processing at said destination in accordance with a policy. The data message or a copy thereof is sent to said destination other than the intended recipient by a sending equipment used to generate the data message.
    Type: Application
    Filed: June 23, 2006
    Publication date: March 29, 2007
    Inventors: Christopher Claudatos, William Andruss
  • Publication number: 20070056046
    Abstract: Performing compliance processing is disclosed. An indication is received that compliance processing is to be performed with respect to content that is subject to an access restriction that would prevent the compliance processing from being performed if the content were not able to be accessed without the restriction. It is ensured that the content can be accessed without the restriction to perform the compliance processing.
    Type: Application
    Filed: August 17, 2006
    Publication date: March 8, 2007
    Inventors: Christopher Claudatos, William Andruss, Bruce Leetch, Jeffrey Porter
  • Publication number: 20070056047
    Abstract: Content processing is disclosed. An indication that a sender desires to send encrypted content to a destination is received. An agreement is obtained from the sender to provide an access key to a node other than the destination and to encrypt content sent to the destination using an encryption key selected such that the access key is usable to decrypt the content.
    Type: Application
    Filed: October 24, 2006
    Publication date: March 8, 2007
    Inventors: Christopher Claudator, William Andruss, Bruce Leetch, Jeffrey Porter
  • Publication number: 20070025537
    Abstract: Processing telephonic communication is disclosed. A request to establish communication is received from a first communication participant. A first identifier associated with the request is mapped to a second identifier associated with a second communication participant. The second identifier is used to establish communication between the first and the second participant in a manner that allows at least a portion of the communication between the first and second participants to be monitored. Compliance processing is performed with respect to at least a portion of said at least a portion of the communication between first and the second participant. The first identifier is made available to the first participant in a manner that causes the first participant to associated the first identifier with the second participant, the first identifier cannot be used to reach the second participant directly, and the second identifier is not provided to the first participant.
    Type: Application
    Filed: June 30, 2005
    Publication date: February 1, 2007
    Inventors: Christopher Claudatos, William Andruss
  • Publication number: 20070025536
    Abstract: Initiating a communication is disclosed. An identifier associated with an intended destination with which the calling party desires to establish communication is received from a calling party. Communication with a compliance node is established. An identifier is provided to the compliance node. The compliance node is configured to establish with the intended destination a communication session in which the compliance node, the intended destination, and the calling party are participants.
    Type: Application
    Filed: June 30, 2005
    Publication date: February 1, 2007
    Inventors: Christopher Claudatos, William Andruss
  • Publication number: 20070025539
    Abstract: Processing a communication is disclosed. A first request to establish communication is received at a redirection node from a requesting communication participant. A destination communication participant associated with the request is determined. A communication session in which the requesting communication participant, the redirection node, and the destination communication participant are participants is established, including sending to equipment associated with the destination communication participant a second request to establish communication. A communication session processing feature not provided with respect to the communication session by a telecommunication service provider associated with a service provider network used to establish and provide the communication session is made available to at least one of the requesting communication participant and the destination communication participant.
    Type: Application
    Filed: June 30, 2005
    Publication date: February 1, 2007
    Inventors: Christopher Claudatos, William Andruss
  • Publication number: 20060072787
    Abstract: A method, article of manufacture, and apparatus for inventory control of items in a location are disclosed. In an embodiment, this comprises a surveillance system comprising a plurality of cameras and at least one display, at least one identification tag, at least one identification tag reader configured to read the identification tag and placed to cover at least a portion of the location, and a computer configured to process information including the identification tag read by the reader. In response to the information, the computer controls a video camera to display an image showing an area around the identification tag. This may be based on a determination of heightened risk, such as when the identification tag is associated with a receipt and is brought back to the location after being removed from the location.
    Type: Application
    Filed: October 1, 2004
    Publication date: April 6, 2006
    Inventors: Christopher Claudatos, William Andruss
  • Publication number: 20060074759
    Abstract: A method, article of manufacture, and apparatus for inventory control of items in a location are disclosed. In an embodiment, this comprises an identification tag associated with a transaction authorizing some items to be removed from the location, such as a purchase, an identification tag reader configured to read the identification tag and placed to cover a portion of the location, and a computer configured to process information including the identification tag read by the reader and take action in response, such as issuing an alert. The inventory control system may be further configured to detect when the identification tag is brought back into the location.
    Type: Application
    Filed: October 1, 2004
    Publication date: April 6, 2006
    Inventors: Christopher Claudatos, William Andruss
  • Publication number: 20060047518
    Abstract: A method, article of manufacture, and apparatus for presenting a plurality of auditory communications having associated data representing at least one term identified in the communication is disclosed. In an embodiment, this comprises providing a visual representation of the term, providing links associated with occurrences of the term in the plurality of communications, and when a link is selected, playing a portion of the communication corresponding to the occurrence of the term. A portion of the communication following the portion corresponding to the occurrence of the term may be played.
    Type: Application
    Filed: October 1, 2004
    Publication date: March 2, 2006
    Inventors: Christopher Claudatos, William Andruss
  • Publication number: 20060004579
    Abstract: A method, article of manufacture, and apparatus for monitoring a location having a plurality of audio sensors and video sensors are disclosed. In an embodiment, this comprises receiving auditory data, comparing a portion of the auditory data to a lexicon comprising a plurality of keywords to determine if there is a match to a keyword from the lexicon, and if a match is found, selecting at least one video sensor to monitor an area to be monitored. Video data from the video sensor is archived with the auditory data and metadata. The video sensor is selected by determining video sensors associated with the areas to be monitored. A lookup table is used to determine the association. Cartesian coordinates may be used to determine positions of components and their areas of coverage.
    Type: Application
    Filed: March 31, 2005
    Publication date: January 5, 2006
    Inventors: Christopher Claudatos, William Andruss, Richard Urmston, John Acott
  • Publication number: 20060004847
    Abstract: A method, article of manufacture, and apparatus for managing a lifecycle of an object are disclosed. In an embodiment, this comprises analyzing the content of the object and associating the object to an information lifecycle management policy based on the content analysis and metadata. Metadata may be generated based on the content analysis, and used in setting the information lifecycle management policy. A date of disposition may be associated with the object, and actions in the ILM policy taken on the date of disposition.
    Type: Application
    Filed: November 30, 2004
    Publication date: January 5, 2006
    Inventors: Christopher Claudatos, William Andruss
  • Publication number: 20060004820
    Abstract: A method, article of manufacture, and apparatus for managing an object are disclosed. In an embodiment, this comprises managing an object having content, in a system having a dynamic policy selector configured with at least one analytic policy applied to evaluate the content of the object. The object is associated to an information management policy. Classification levels may be used, in which classification levels are associated to information management policies and objects are associated with classification levels. Objects containing certain elements or related elements may be associated to form an information group, to which information management policies may be applied as a group. Storage pools may be used for managing objects with similar classification levels or information protection policies.
    Type: Application
    Filed: December 31, 2004
    Publication date: January 5, 2006
    Inventors: Christopher Claudatos, William Andruss, Richard Urmston, Mark Rambacher
  • Publication number: 20060004582
    Abstract: A method, article of manufacture, and apparatus for monitoring a location having a plurality of audio sensors and video sensors are disclosed. In an embodiment, this comprises receiving auditory data, comparing a portion of the auditory data to a lexicon comprising a plurality of keywords to determine if there is a match to a keyword from the lexicon, and if a match is found, selecting at least one video sensor to monitor an area to be monitored. Video data from the video sensor is archived with the auditory data and metadata. The video sensor is selected by determining video sensors associated with the areas to be monitored. A lookup table is used to determine the association. Cartesian coordinates may be used to determine positions of components and their areas of coverage.
    Type: Application
    Filed: March 31, 2005
    Publication date: January 5, 2006
    Inventors: Christopher Claudatos, William Andruss, Richard Urmston, John Acott
  • Publication number: 20060004581
    Abstract: A method, article of manufacture, and apparatus for monitoring a location having a plurality of audio sensors and video sensors are disclosed. In an embodiment, this comprises receiving auditory data, comparing a portion of the auditory data to a lexicon comprising a plurality of keywords to determine if there is a match to a keyword from the lexicon, and if a match is found, selecting at least one video sensor to monitor an area to be monitored. Video data from the video sensor is archived with the auditory data and metadata. The video sensor is selected by determining video sensors associated with the areas to be monitored. A lookup table is used to determine the association. Cartesian coordinates may be used to determine positions of components and their areas of coverage.
    Type: Application
    Filed: March 31, 2005
    Publication date: January 5, 2006
    Inventors: Christopher Claudatos, William Andruss, Richard Urmston, John Acott