Patents Assigned to Verdasys, Inc.
  • Patent number: 7934091
    Abstract: A technique for establishing a perimeter of accountability for usage of digital assets such as data files. The accountability model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such as in the background of a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, aggregates them, and makes reports to a journaling server. The journaling server analyzes sequences of low level events to detect when aggregate events of interest occur, such as “FileEdit”, network file transfers and the like. Reports can be generated to provide an understanding of how digital assets have been accessed, used or communicated by individuals in an enterprise.
    Type: Grant
    Filed: December 9, 2008
    Date of Patent: April 26, 2011
    Assignee: Verdasys, Inc.
    Inventors: Nicholas Stamos, Seth N. Birnbaum, Tomas Revesz, Jr., Donato Buccella, Keith A. MacDonald, Dwayne A. Carson, William E. Fletcher
  • Patent number: 7814021
    Abstract: A technique for establishing usage control over digital assets such as computer files. The system model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such a background process in a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, and aggregates them. A policy engine analyzes sequences of aggregate events to determine when policy violations occur.
    Type: Grant
    Filed: November 12, 2003
    Date of Patent: October 12, 2010
    Assignee: Verdasys, Inc.
    Inventors: Nicholas Stamos, Seth N. Birnbaum, Tomas Revesz, Jr., Donato Buccella, Keith A. MacDonald, Dwayne A. Carson, William E. Fletcher
  • Publication number: 20090198765
    Abstract: A technique for establishing a perimeter of accountability for usage of digital assets such as data files. The accountability model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such as in the background of a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, aggregates them, and makes reports to a journaling server. The journaling server analyzes sequences of low level events to detect when aggregate events of interest occur, such as “FileEdit”, network file transfers and the like. Reports can be generated to provide an understanding of how digital assets have been accessed, used or communicated by individuals in an enterprise.
    Type: Application
    Filed: December 9, 2008
    Publication date: August 6, 2009
    Applicant: Verdasys, Inc.
    Inventors: Nicholas Stamos, Seth N. Birnbaum, Tomas Revesz, JR., Donato Buccella, Keith A. MacDonald, Dwayne A. Carson, William E. Fletcher
  • Patent number: 7496575
    Abstract: A data processing application logging, recording, and reporting process and infrastructure. Compliance with regulatory directives such as HIPAA, internal organizational and corporate, personal information privacy, and other security policies can thus be enforced without the need to recode legacy application software. In one preferred embodiment, a core agent process provides “listener” functionality that captures user input events, such as keyboard and mouse interactions, between a user and a legacy application of interest. The agent obtains instructions for how to deal with such events, accessing information that describes the application's behavior as already captured by an application profiler tool. Keyboard and mouse data entry sequences, screen controls and fields of interest are tagged during application profiling process. This data is stored in application profile developed for each mode of a legacy application.
    Type: Grant
    Filed: November 22, 2004
    Date of Patent: February 24, 2009
    Assignee: Verdasys, Inc.
    Inventors: Donato Buccella, Seth N. Birnbaum, Nicholas Stamos, Leonard F. Halio, Dwayne Carson, Luis M. Fernandes
  • Patent number: 7490116
    Abstract: A technique for efficient representation of dependencies between electronically-stored documents, such as in an enterprise data processing system. A document distribution path is developed as a directional graph that is a representation of the historic dependencies between documents, which is constructed in real time as documents are created. The system preferably maintains a lossy hierarchical representation of the documents indexed in such a way that allows for fast queries for similar but not necessarily equivalent documents. A distribution path, coupled with a document similarity service, can be used to provide a number of applications, such as a security solution that is capable of finding and restricting access to documents that contain information that is similar to other existing files that are known to contain sensitive information.
    Type: Grant
    Filed: December 17, 2003
    Date of Patent: February 10, 2009
    Assignee: Verdasys, Inc.
    Inventors: Dwayne A. Carson, Donato Buccella, Michael Smolsky
  • Patent number: 7472272
    Abstract: A technique for establishing a perimeter of accountability for usage of digital assets such as data files. The accountability model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such as in the background of a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, aggregates them, and makes reports to a journaling server. The journaling server analyzes sequences of low level events to detect when aggregate events of interest occur, such as “FileEdit”, network file transfers and the like. Reports can be generated to provide an understanding of how digital assets have been accessed, used or communicated by individuals in an enterprise.
    Type: Grant
    Filed: November 18, 2003
    Date of Patent: December 30, 2008
    Assignee: Verdasys, Inc.
    Inventors: Nicholas Stamos, Seth N. Birnbaum, Tomas Revesz, Jr., Donato Buccella, Keith A. MacDonald, Dwayne A. Carson, William E. Fletcher
  • Patent number: 7409547
    Abstract: A technique for adaptive encryption of digital assets such as computer files. The system model monitors passage of files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such a background process in a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, and aggregates them. A policy engine analyzes sequences of aggregate events to determine when to apply encryption.
    Type: Grant
    Filed: August 28, 2006
    Date of Patent: August 5, 2008
    Assignee: Verdasys, Inc.
    Inventors: Nicholas Stamos, Donato Buccella, Dwayne A. Carson
  • Publication number: 20060294373
    Abstract: A technique for adaptive encryption of digital assets such as computer files. The system model monitors passage of files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such a background process in a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, and aggregates them. A policy engine analyzes sequences of aggregate events to determine when to apply encryption.
    Type: Application
    Filed: August 28, 2006
    Publication date: December 28, 2006
    Applicant: Verdasys, Inc.
    Inventors: Nicholas Stamos, Donato Buccella, Dwayne Carson
  • Patent number: 7100047
    Abstract: A technique for adaptive encryption of digital assets such as computer files. The system model monitors passage of files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such a background process in a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, and aggregates them. A policy engine analyzes sequences of aggregate events to determine when to apply encryption.
    Type: Grant
    Filed: December 31, 2003
    Date of Patent: August 29, 2006
    Assignee: Verdasys, Inc.
    Inventors: Nicholas Stamos, Donato Buccella, Dwayne A. Carson
  • Patent number: 6947933
    Abstract: A technique for determining when documents stored in digital format in a data processing system are similar. A method compares a sparse representation of two or more documents by breaking the documents into “chunks” of data of predefined sizes. Selected subsets of the chunks are determined as being representative of data in the documents and coefficients are developed to represent such chunks. Coefficients are then combined into coefficient clusters containing coefficients that are similar according to a predetermined similarity metric. The degree of similarity between documents is then evaluated by counting clusters into which chunks of similar documents fall.
    Type: Grant
    Filed: December 17, 2003
    Date of Patent: September 20, 2005
    Assignee: Verdasys, Inc.
    Inventor: Michael Smolsky
  • Publication number: 20050060537
    Abstract: A technique for establishing usage control over digital assets such as computer files. The system model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such a background process in a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, and aggregates them. A policy engine analyzes sequences of aggregate events to determine when policy violations occur.
    Type: Application
    Filed: November 12, 2003
    Publication date: March 17, 2005
    Applicant: Verdasys, Inc.
    Inventors: Nicholas Stamos, Seth Birnbaum, Tomas Revesz, Donato Buccella, Keith MacDonald, Dwayne Carson, William Fletcher
  • Publication number: 20040255160
    Abstract: A technique for establishing a perimeter of accountability for usage of digital assets such as data files. The accountability model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such as in the background of a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, aggregates them, and makes reports to a journaling server. The journaling server analyzes sequences of low level events to detect when aggregate events of interest occur, such as “FileEdit”, network file transfers and the like. Reports can be generated to provide an understanding of how digital assets have been accessed, used or communicated by individuals in an enterprise.
    Type: Application
    Filed: November 18, 2003
    Publication date: December 16, 2004
    Applicant: Verdasys, Inc.
    Inventors: Nicholas Stamos, Seth N. Birnbaum, Tomas Revesz, Donato Buccella, Keith A. MacDonald, Dwayne A. Carson, William E. Fletcher
  • Publication number: 20040221172
    Abstract: A technique for adaptive encryption of digital assets such as computer files. The system model monitors passage of files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such a background process in a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, and aggregates them. A policy engine analyzes sequences of aggregate events to determine when to apply encryption.
    Type: Application
    Filed: December 31, 2003
    Publication date: November 4, 2004
    Applicant: Verdasys, Inc.
    Inventors: Nicholas Stamos, Donato Buccella, Dwayne A. Carson
  • Publication number: 20040172394
    Abstract: A technique for determining when documents stored in digital format in a data processing system are similar. A method compares a sparse representation of two or more documents by breaking the documents into “chunks” of data of predefined sizes. Selected subsets of the chunks are determined as being representative of data in the documents and coefficients are developed to represent such chunks. Coefficients are then combined into coefficient clusters containing coefficients that are similar according to a predetermined similarity metric. The degree of similarity between documents is then evaluated by counting clusters into which chunks of similar documents fall.
    Type: Application
    Filed: December 17, 2003
    Publication date: September 2, 2004
    Applicant: Verdasys, Inc.
    Inventor: Michael Smolsky
  • Publication number: 20040167921
    Abstract: A technique for efficient representation of dependencies between electronically-stored documents, such as in an enterprise data processing system. A document distribution path is developed as a directional graph that is a representation of the historic dependencies between documents, which is constructed in real time as documents are created. The system preferably maintains a lossy hierarchical representation of the documents indexed in such a way that allows for fast queries for similar but not necessarily equivalent documents. A distribution path, coupled with a document similarity service, can be used to provide a number of applications, such as a security solution that is capable of finding and restricting access to documents that contain information that is similar to other existing files that are known to contain sensitive information.
    Type: Application
    Filed: December 17, 2003
    Publication date: August 26, 2004
    Applicant: Verdasys, Inc.
    Inventors: Dwayne A. Carson, Donato Buccella, Michael Smolsky