Patents by Inventor Charles S. Fenton
Charles S. Fenton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8621594Abstract: A method and system for secure communication is presented. A virtual private proxy is generated based on an agreement between a first entity and a second entity. A first virtual private proxy is associated with the first entity and a second virtual private proxy is associated with the second entity. Data associated with the first entity is monitored at the virtual private proxy. Whether the data violates the agreement is determined and communication of the data from the first virtual private proxy to the second virtual private proxy is disallowed when the data violates the agreement.Type: GrantFiled: May 4, 2011Date of Patent: December 31, 2013Assignee: IBM International Group, B.V.Inventors: Charles S. Fenton, Keith E. Shafer
-
Publication number: 20110209199Abstract: A method and system for secure communication is presented. A virtual private proxy is generated based on an agreement between a first entity and a second entity. A first virtual private proxy is associated with the first entity and a second virtual private proxy is associated with the second entity. Data associated with the first entity is monitored at the virtual private proxy. Whether the data violates the agreement is determined and communication of the data from the first virtual private proxy to the second virtual private proxy is disallowed when the data violates the agreement.Type: ApplicationFiled: May 4, 2011Publication date: August 25, 2011Applicant: STERLING COMMERCE, INC.Inventors: Charles S. Fenton, Keith E. Shafer
-
Patent number: 7958550Abstract: A method and system for secure communication is presented. A virtual private proxy is generated based on an agreement between a first entity and a second entity. A first virtual private proxy is associated with the first entity and a second virtual private proxy is associated with the second entity. Data associated with the first entity is monitored at the virtual private proxy. Whether the data violates the agreement is determined and communication of the data from the first virtual private proxy to the second virtual private proxy is disallowed when the data violates the agreement.Type: GrantFiled: November 2, 2001Date of Patent: June 7, 2011Assignee: Sterling Commerce, Inc.Inventors: Charles S. Fenton, Keith E. Shafer
-
Publication number: 20100199097Abstract: A method for non-repudiable translation of documents is disclosed, whereby a computer application determines a storage location for a first document, generates a first digital signature for the first document, determines a storage location for a plurality of translation instructions, generates a second digital signature for the plurality of translation instructions, translates the first document, assembles a second document including the storage location for the first document, the storage location for the plurality of translation instructions, the first digital signature, the second digital signature, the translation, and at least one encryption key associated with the first document and the plurality of translation instructions, and digitally signs the second document. The signed document includes sufficient information to demonstrate non-repudiable translation of the first document.Type: ApplicationFiled: April 12, 2010Publication date: August 5, 2010Applicant: Sterling Commerce, Inc.Inventor: Charles S. Fenton
-
Patent number: 7725819Abstract: A method for non-repudiable translation of documents is disclosed, whereby a computer application determines a storage location for a first document, generates a first digital signature for the first document, determines a storage location for a plurality of translation instructions, generates a second digital signature for the plurality of translation instructions, translates the first document, assembles a second document including the storage location for the first document, the storage location for the plurality of translation instructions, the first digital signature, the second digital signature, the translation, and at least one encryption key associated with the first document and the plurality of translation instructions, and digitally signs the second document. The signed document includes sufficient information to demonstrate non-repudiable translation of the first document.Type: GrantFiled: August 26, 2005Date of Patent: May 25, 2010Assignee: Sterling Commerce, Inc.Inventor: Charles S. Fenton
-
Patent number: 7171650Abstract: A method for integrating a resource in a network includes receiving at a first adapter a command associated with a function to be performed by a resource. The method also includes receiving a first script associated with the command, and interpreting the first script to produce one or more first byte codes. The method further includes causing a second adapter to receive a second script. The second adapter is operable to interpret the second script into one or more second byte codes. In addition, the method includes executing the one or more first byte codes, and invoking execution of the one or more second byte codes at the second adapter. The execution of the byte codes at the first and second adapters is operable to invoke the function in and facilitate communication with the resource.Type: GrantFiled: August 23, 2002Date of Patent: January 30, 2007Assignee: SBC Properties, L.P.Inventors: Charles S. Fenton, Ryan P. Harris
-
Patent number: 6938014Abstract: A method for non-repudiable translation of documents is disclosed, whereby a computer application determines a storage location for a first document, generates a first digital signature for the first document, determines a storage location for a plurality of translation instructions, generates a second digital signature for the plurality of translation instructions, translates the first document, assembles a second document including the storage location for the first document, the storage location for the plurality of translation instructions, the first digital signature, the second digital signature, the translation, and at least one encryption key associated with the first document and the plurality of translation instructions, and digitally signs the second document. The signed document includes sufficient information to demonstrate non-repudiable translation of the first document.Type: GrantFiled: January 16, 2002Date of Patent: August 30, 2005Assignee: Sterling Commerce, Inc.Inventor: Charles S. Fenton
-
Publication number: 20040040030Abstract: A method for integrating a resource in a network includes receiving at a first adapter a command associated with a function to be performed by a resource. The method also includes receiving a first script associated with the command, and interpreting the first script to produce one or more first byte codes. The method further includes causing a second adapter to receive a second script. The second adapter is operable to interpret the second script into one or more second byte codes. In addition, the method includes executing the one or more first byte codes, and invoking execution of the one or more second byte codes at the second adapter. The execution of the byte codes at the first and second adapters is operable to invoke the function in and facilitate communication with the resource.Type: ApplicationFiled: August 23, 2002Publication date: February 26, 2004Applicant: SBC Properties, L.P.Inventors: Charles S. Fenton, Ryan P. Harris
-
Publication number: 20030088789Abstract: A method and system for secure communication is presented. A virtual private proxy is generated based on an agreement between a first entity and a second entity. A first virtual private proxy is associated with the first entity and a second virtual private proxy is associated with the second entity. Data associated with the first entity is monitored at the virtual private proxy. Whether the data violates the agreement is determined and communication of the data from the first virtual private proxy to the second virtual private proxy is disallowed when the data violates the agreement.Type: ApplicationFiled: November 2, 2001Publication date: May 8, 2003Inventors: Charles S. Fenton, Keith E. Shafer