Patents by Inventor C.S. CRAWFORD

C.S. CRAWFORD has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070219950
    Abstract: In one embodiment, a method controls access rights within a system. The method comprises: physically transporting a portable card by the first end-user from a networked processor-based system to multiple non-networked processor-based systems; processing respective access attempts from the first end-user by the multiple non-networked processor-based systems, wherein the access attempts occur when the first-end user is in physical proximity to the multiple non-networked processor-based systems; and in conjunction with processing of the respective access attempts by the multiple non-networked processor-based systems, reading the revocation data from the portable card of the first-end user by the multiple non-networked processor-based systems and locally storing the revocation data by the multiple non-networked processor-based systems, wherein upon storing the updated revocation data, the multiple non-networked processor-based systems become operable to deny access to a second end-user.
    Type: Application
    Filed: February 21, 2007
    Publication date: September 20, 2007
    Inventor: C.S. Crawford
  • Publication number: 20070214180
    Abstract: In one embodiment, a method for operating a social network application, comprises: capturing an image or video using a wireless device by a user of the social network application; communicating the image or video from the wireless device of the user to a social network application server; storing the image or video by the social network application server; identifying a user account by the social network application server in response to communication of the image or video; and modifying data, by the social network application server, associated with the account of the user to automatically post the image or video to a web page of the user to make the image or video available for viewing by other users of the social network application.
    Type: Application
    Filed: May 11, 2007
    Publication date: September 13, 2007
    Inventor: C.S. Crawford
  • Publication number: 20070157290
    Abstract: In one embodiment, access attempts within a system are logged. The system comprises at least one security server for managing access rights and at least one networked processor-based system that processes access attempts to provide or deny access and multiple non-networked processor-based systems that process access attempts to provide or deny access. The access attempts are made by employees of a common organization and the at least one security server maintains one or several databases that store data pertaining to the end-user employees of the common organization, networked and non-networked processor-based systems of the common organization, and access rights specific to the common organization. The access attempt logs are written to end-user cards and communicated to the central server through the at least one processor-based system.
    Type: Application
    Filed: March 12, 2007
    Publication date: July 5, 2007
    Inventor: C.S. CRAWFORD
  • Publication number: 20070156912
    Abstract: In one embodiment, access log information is written to portable cards of end-users of system that includes networked and non-networked processor based systems that control user access. In conjunction with processing of access attempts by non-networked processor-based systems, time stamps of accesses by each end-user for multiple accesses on multiple processor-based systems are analyzed against one or more access rules, the one or more rules defining one or more relative timing constraints or order constraints for accesses on multiple processor-based systems. Also, in conjunction with processing of the further access attempts by the non-networked processor-based systems, access decisions are controlled in response to determining whether the time stamps of respective end-users indicate that said respective end-users have violated the one or more access rules.
    Type: Application
    Filed: March 12, 2007
    Publication date: July 5, 2007
    Inventor: C.S. CRAWFORD