Patents by Inventor William Victor Moon

William Victor Moon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11870899
    Abstract: Secure access recovery to a network device includes encrypting a user password into an encrypted target password using a secret regenerative key, and adding a one-time password seed and the encrypted target password into a secure recovery container, which is stored securely in the network device and a trusted recovery device. In response to a recovery request, a one-time password can be generated using the one-time password seed to retrieve the encrypted target password from the recovery device. A decrypted recovery password is generated based on executing decryption on an input string based on the secret regenerative key. The encrypted target password, retrieved from the secure recovery container in the network device, is decrypted into a decrypted target password based on the secret regenerative key. Secure access is recovered in response to determining the decrypted recovery password matches at least a part of the decrypted target password.
    Type: Grant
    Filed: August 30, 2021
    Date of Patent: January 9, 2024
    Assignee: WhiteStar Communications, Inc.
    Inventors: Billy Gayle Moon, William Victor Moon, Aaron Daniel Fleshner, Christopher Micheal Scalcucci
  • Publication number: 20230111701
    Abstract: A secure keyboard resource executed in a network device detects a user input, and generates a user input data structure representing the user input relative to input options presented to the user, the user input data structure based on the secure keyboard resource identifying a position of the user input relative to the input options. The secure keyboard resource sends the user input data structure to one or more executable destination resources, having requested supply of the user input data structure responsive to a user selection, only via a corresponding data path providing the destination resource with access to the user input data structure, for execution of a service by the one or more executable destination resources based on the user input data structure. The secure keyboard resource thus minimizes spying by limiting access of the user input data structure to the destination resource via the data path.
    Type: Application
    Filed: October 7, 2021
    Publication date: April 13, 2023
    Applicant: WhiteStar Communications, Inc.
    Inventors: BILLY GAYLE MOON, WILLIAM VICTOR MOON, FABIAN REDDIG
  • Publication number: 20230060803
    Abstract: Secure access recovery to a network device includes encrypting a user password into an encrypted target password using a secret regenerative key, and adding a one-time password seed and the encrypted target password into a secure recovery container, which is stored securely in the network device and a trusted recovery device. In response to a recovery request, a one-time password can be generated using the one-time password seed to retrieve the encrypted target password from the recovery device. A decrypted recovery password is generated based on executing decryption on an input string based on the secret regenerative key. The encrypted target password, retrieved from the secure recovery container in the network device, is decrypted into a decrypted target password based on the secret regenerative key. Secure access is recovered in response to determining the decrypted recovery password matches at least a part of the decrypted target password.
    Type: Application
    Filed: August 30, 2021
    Publication date: March 2, 2023
    Applicant: WhiteStar Communications, Inc.
    Inventors: BILLY GAYLE MOON, WILLIAM VICTOR MOON, AARON DANIEL FLESHNER, CHRISTOPHER MICHEAL SCALCUCCI
  • Publication number: 20220417252
    Abstract: In one embodiment, a method comprises: securing, by a security agent executed within a network device, first secure data structures for secure storage in the network device and second secure data structures for secure communications in a secure peer-to-peer data network; monitoring, by the security agent, a corresponding mandatory lifecycle policy for each of the first secure data structures; and cryptographically erasing one of the first secure data structures in response to expiration of the corresponding mandatory lifecycle policy.
    Type: Application
    Filed: June 29, 2021
    Publication date: December 29, 2022
    Applicant: WhiteStar Communications, Inc.
    Inventors: BILLY GAYLE MOON, WILLIAM VICTOR MOON
  • Publication number: 20210081524
    Abstract: The present invention is systems and methods of establishing secure passwords using real-time dynamic feedback, comprising: selecting manual creation or automated suggestions at the time of creation of password for a system; creating a password manually or selecting one of the suggested passwords from an automated list; sending the selected password in clear text for evaluation; receiving an evaluation report on the strength of the password; analyzing whether the evaluation report meets the security threshold; confirming the password if the evaluation report meets or exceeds the security threshold; rejecting the password if the evaluation report is below the security threshold; after rejection going back to the step of creating the password manually or selecting another of the suggested passwords from the automated list.
    Type: Application
    Filed: September 18, 2019
    Publication date: March 18, 2021
    Applicant: Whitestar Communications, Inc.
    Inventor: William Victor Moon
  • Publication number: 20200101631
    Abstract: An apparatus and method to a folding and a partially rotational device, comprising: stabilizing the frame holder of the device for the axis on which a partially rotational part rotates; spindle locking the partial rotation at two-ends using a spindle with screws at each-end of the spindle; defining the two-ends for the rotation with two or more stop pins; allowing the rotation with two or more compression springs; installing and cleaning the compression springs using a wiper; wherein tension of the rotation is adjusted by placement of one or more of the wiper or compression spring length.
    Type: Application
    Filed: October 1, 2018
    Publication date: April 2, 2020
    Applicant: Will Moon Custom Knives LLC
    Inventors: William Victor Moon, Billy Gayle Moon