Patents by Inventor William Rodgers Ackerly
William Rodgers Ackerly has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11991155Abstract: A method for securing data access by containerized applications includes intercepting, by a first container executing on a first computing device and associated with a containerized application in a second container executing on the first computing device, a first Internet Protocol (IP) request from the containerized application. The first container determines that the IP request is addressed to a second computing device executing a resource that the containerized application is authorized to access. The first container encrypts a payload portion of the IP request and transmits, to the resource, a second IP request with the encrypted payload portion. The first container receives, from the resource, a response. The first container requests, from a third computing device, a cryptographic key for decrypting the response. The first container decrypts, with the cryptographic key, a payload portion of the response and transmits, to the containerized application, the decrypted payload portion of the response.Type: GrantFiled: February 24, 2021Date of Patent: May 21, 2024Assignee: Virtru CorporationInventors: William Rodgers Ackerly, Julian Embry Herwitz, Timothy Robert Tschampel
-
Publication number: 20240045996Abstract: A method for multi-factor, biometrics-based, secure data signature includes generating, by a biometrics reader device, a first biometric measurement using a physical characteristic of a user. The method includes selecting, by at least one noise-resistant feature transformation and hashing module executing on a processor of a computing device, a code word in a set of code words, wherein selecting further comprises applying an error correcting code to the first biometric measurement. The method includes generating, by the at least one noise-resistant feature transformation and hashing module, a first hash, wherein generating further comprises executing a hashing algorithm and using the selected code word as input to the hashing algorithm. The method includes generating, by the at least one noise-resistant feature transformation and hashing module, a public key and a private key, using the first hash. The method includes electronically signing, with the private key, data associated with the user.Type: ApplicationFiled: August 3, 2023Publication date: February 8, 2024Inventors: Gadalia Montoya Weinberg O'Bryan, William Rodgers Ackerly
-
Publication number: 20230095504Abstract: A method of restricting data access based on properties of at least one of a process and a machine executing the process includes receiving, by an access control management system, from a first computing device, information associated with an encrypted data object. The method includes requesting, by the access control management system, from a verifier, verification that a second computing device executes a process in accordance with a process attribute identified in the information associated with the encrypted data object. The method includes sending, by the access control management system, to the second computing device, the received information associated with the encrypted data object, responsive to the verification of the process attribute.Type: ApplicationFiled: December 2, 2022Publication date: March 30, 2023Inventors: Rebecca Claire Weiss, Reuven Mark Vallejo Gonzales, William Rodgers Ackerly
-
Patent number: 11531777Abstract: A method of restricting data access based on properties of at least one of a process and a machine executing the process includes receiving, by an access control management system, from a first computing device, information associated with an encrypted data object. The method includes requesting, by the access control management system, from a verifier, verification that a second computing device executes a process in accordance with a process attribute identified in the information associated with the encrypted data object. The method includes sending, by the access control management system, to the second computing device, the received information associated with the encrypted data object, responsive to the verification of the process attribute.Type: GrantFiled: January 23, 2020Date of Patent: December 20, 2022Assignee: Virtru CorporationInventors: Rebecca Claire Weiss, Reuven Mark Vallejo Gonzales, William Rodgers Ackerly
-
Publication number: 20210281548Abstract: A method for securing data access by containerized applications includes intercepting, by a first container executing on a first computing device and associated with a containerized application in a second container executing on the first computing device, a first Internet Protocol (IP) request from the containerized application. The first container determines that the IP request is addressed to a second computing device executing a resource that the containerized application is authorized to access. The first container encrypts a payload portion of the IP request and transmits, to the resource, a second IP request with the encrypted payload portion. The first container receives, from the resource, a response. The first container requests, from a third computing device, a cryptographic key for decrypting the response. The first container decrypts, with the cryptographic key, a payload portion of the response and transmits, to the containerized application, the decrypted payload portion of the response.Type: ApplicationFiled: February 24, 2021Publication date: September 9, 2021Inventors: William Rodgers Ackerly, Julian Embry Herwitz, Timothy Robert Tschampel
-
Publication number: 20200242267Abstract: A method of restricting data access based on properties of at least one of a process and a machine executing the process includes receiving, by an access control management system, from a first computing device, information associated with an encrypted data object. The method includes requesting, by the access control management system, from a verifier, verification that a second computing device executes a process in accordance with a process attribute identified in the information associated with the encrypted data object. The method includes sending, by the access control management system, to the second computing device, the received information associated with the encrypted data object, responsive to the verification of the process attribute.Type: ApplicationFiled: January 23, 2020Publication date: July 30, 2020Inventors: Rebecca Claire Weiss, Reuven Mark Vallejo Gonzales, William Rodgers Ackerly
-
Patent number: 9578021Abstract: A method includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object. The access control management system receives, from a second client device, a request for the information. The access control management system verifies that a user of the second client device is identified in the received information. The access control management system selects an identity provider, based on a user identifier included in the received information, the user identifier associated with the user of the second client device. The access control management system requests from the selected identity provider, authentication of the user of the second client device. The access control management system sends, to the second client device, the received information. The access control management system stores an identification of at least one of the second client device and the received request for the information.Type: GrantFiled: November 23, 2015Date of Patent: February 21, 2017Inventor: William Rodgers Ackerly
-
Publication number: 20160119335Abstract: A method includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object. The access control management system receives, from a second client device, a request for the information. The access control management system verifies that a user of the second client device is identified in the received information. The access control management system selects an identity provider, based on a user identifier included in the received information, the user identifier associated with the user of the second client device. The access control management system requests from the selected identity provider, authentication of the user of the second client device. The access control management system sends, to the second client device, the received information. The access control management system stores an identification of at least one of the second client device and the received request for the information.Type: ApplicationFiled: November 23, 2015Publication date: April 28, 2016Inventor: William Rodgers Ackerly
-
Patent number: 9225709Abstract: A method for distributing cryptographic data to trusted recipients includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object, the information including an identification of a platform for generating an integrity measurement digitally signed by a root of trust. The access control management system receives, from a second client device, a request for the information associated with the encrypted data object. The access control management system verifies that the second client device includes the platform for generating the integrity measurement digitally signed by the root of trust. The access control management system determines, based on the verification of the second client device, not to authenticate the second client device. The access control management system sends, to the second client device, the received information associated with the encrypted data object, responsive to the determination.Type: GrantFiled: September 18, 2014Date of Patent: December 29, 2015Assignee: Virtru CorporationInventor: William Rodgers Ackerly
-
Publication number: 20150006884Abstract: A method for distributing cryptographic data to trusted recipients includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object, the information including an identification of a platform for generating an integrity measurement digitally signed by a root of trust. The access control management system receives, from a second client device, a request for the information associated with the encrypted data object. The access control management system verifies that the second client device includes the platform for generating the integrity measurement digitally signed by the root of trust. The access control management system determines, based on the verification of the second client device, not to authenticate the second client device. The access control management system sends, to the second client device, the received information associated with the encrypted data object, responsive to the determination.Type: ApplicationFiled: September 18, 2014Publication date: January 1, 2015Inventor: William Rodgers Ackerly
-
Patent number: 8874902Abstract: A method for distributing cryptographic data to authenticated recipients includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object. The method includes receiving, by the access control management system, from a second client device, a request for the information associated with the encrypted data object. The method includes verifying, by the access control management system, that a user of the second client device is identified in the received information associated with the encrypted data object. The method includes authenticating, by the access control management system, with an identity provider, the user of the second client device. The method includes sending, by the access control management system, to the second client device, the received information associated with the encrypted data object.Type: GrantFiled: October 28, 2013Date of Patent: October 28, 2014Assignee: Virtru CorporationInventor: William Rodgers Ackerly
-
Publication number: 20140052982Abstract: A method for distributing cryptographic data to authenticated recipients includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object. The method includes receiving, by the access control management system, from a second client device, a request for the information associated with the encrypted data object. The method includes verifying, by the access control management system, that a user of the second client device is identified in the received information associated with the encrypted data object. The method includes authenticating, by the access control management system, with an identity provider, the user of the second client device. The method includes sending, by the access control management system, to the second client device, the received information associated with the encrypted data object.Type: ApplicationFiled: October 28, 2013Publication date: February 20, 2014Applicant: VirTru CorporationInventor: William Rodgers Ackerly
-
Patent number: 8589673Abstract: A method for distributing cryptographic data to authenticated recipients includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object. The method includes receiving, by the access control management system, from a second client device, a request for the information associated with the encrypted data object. The method includes verifying, by the access control management system, that a user of the second client device is identified in the received information associated with the encrypted data object. The method includes authenticating, by the access control management system, with an identity provider, the user of the second client device. The method includes sending, by the access control management system, to the second client device, the received information associated with the encrypted data object.Type: GrantFiled: December 30, 2011Date of Patent: November 19, 2013Assignee: VirTru CorporationInventor: William Rodgers Ackerly
-
Publication number: 20120179905Abstract: A method for distributing cryptographic data to authenticated recipients includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object. The method includes receiving, by the access control management system, from a second client device, a request for the information associated with the encrypted data object. The method includes verifying, by the access control management system, that a user of the second client device is identified in the received information associated with the encrypted data object. The method includes authenticating, by the access control management system, with an identity provider, the user of the second client device. The method includes sending, by the access control management system, to the second client device, the received information associated with the encrypted data object.Type: ApplicationFiled: December 30, 2011Publication date: July 12, 2012Inventor: William Rodgers Ackerly