Patents by Inventor Christopher Scott Alcott

Christopher Scott Alcott has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11501025
    Abstract: A method for providing and maintaining secure storage of target data includes, during a first time period in which a server provides a first mapping between user-specific cloaking sequence elements and hidden sequence elements, cloaking the target data using a first set of user-specific cloaking sequences and the first mapping, and storing the cloaked data in a persistent memory. The method further includes, during a later, second time period in which the server provides a different, second mapping between the user-specific cloaking sequence elements and the hidden sequence elements, re-cloaking the cloaked data using the first set of user-specific cloaking sequences and the second mapping, and storing the re-cloaked data in the persistent memory.
    Type: Grant
    Filed: March 19, 2021
    Date of Patent: November 15, 2022
    Assignee: Charter Communications Operating, LLC
    Inventors: James Anderson Blackley, Jay Eric Carlson, Michael David Hanrahan, Bajeed Pattan, Christopher Scott Alcott
  • Publication number: 20220035935
    Abstract: In a method for providing secure data storage, a user selection of a plurality of cloaking sequences is received. The cloaking sequences include at least a first and second cloaking sequence. The method also includes cloaking data (e.g., one or more files). Cloaking the data includes retrieving a first hidden sequence associated with the first cloaking sequence, and retrieving a second hidden sequence associated with the second cloaking sequence. The second hidden sequence includes an ordered sequence of bit sets each including one or more bits. Cloaking the data also includes using the first hidden sequence to identify offset positions within the data, and using the ordered sequence of bit sets to perform one or more operations on the data at the identified offset positions. The method further includes storing the cloaked data.
    Type: Application
    Filed: October 12, 2021
    Publication date: February 3, 2022
    Inventors: James Anderson Blackley, Jay Eric Carlson, Michael David Hanrahan, Bajeed Pattan, Christopher Scott Alcott
  • Patent number: 11176262
    Abstract: In a method for providing secure data storage, a user interface is provided to a user, and a user selection of a plurality of cloaking sequences is received via the user interface. The cloaking sequences include at least a first and second cloaking sequence. The method also includes cloaking data (e.g., one or more files). Cloaking the data includes retrieving a first hidden sequence associated with the first cloaking sequence, and retrieving a second hidden sequence associated with the second cloaking sequence. The second hidden sequence includes an ordered sequence of bit sets each including one or more bits. Cloaking the data also includes using the first hidden sequence to identify offset positions within the data, and using the ordered sequence of bit sets to perform one or more operations on the data at the identified offset positions. The method further includes storing the cloaked data in a database.
    Type: Grant
    Filed: February 15, 2019
    Date of Patent: November 16, 2021
    Assignee: Charter Communications Operating, LLC
    Inventors: James Anderson Blackley, Jay Eric Carlson, Michael David Hanrahan, Bajeed Pattan, Christopher Scott Alcott
  • Publication number: 20210209258
    Abstract: A method for providing and maintaining secure storage of target data includes, during a first time period in which a server provides a first mapping between user-specific cloaking sequence elements and hidden sequence elements, cloaking the target data using a first set of user-specific cloaking sequences and the first mapping, and storing the cloaked data in a persistent memory. The method further includes, during a later, second time period in which the server provides a different, second mapping between the user-specific cloaking sequence elements and the hidden sequence elements, re-cloaking the cloaked data using the first set of user-specific cloaking sequences and the second mapping, and storing the re-cloaked data in the persistent memory.
    Type: Application
    Filed: March 19, 2021
    Publication date: July 8, 2021
    Inventors: James Anderson Blackley, Jay Eric Carlson, Michael David Hanrahan, Bajeed Pattan, Christopher Scott Alcott
  • Patent number: 10984137
    Abstract: A method for providing and maintaining secure storage of data includes cloaking the data by retrieving, from a database and using a first set of user-specific cloaking sequences and a first mapping, a first set of hidden sequences, and applying the data and the first set of hidden sequences as inputs to a cloaking algorithm. The cloaked data is stored in a persistent memory. The method further includes, during a later, second time period, re-cloaking the cloaked data by uncloaking the cloaked data using the first set of hidden sequences, retrieving, from the database and using the first set of user-specific cloaking sequences and a different, second mapping, a second set of one or more hidden sequences, and applying the uncloaked data and the second set of hidden sequences as inputs to the cloaking algorithm. The re-cloaked data is stored in the persistent memory.
    Type: Grant
    Filed: February 15, 2019
    Date of Patent: April 20, 2021
    Assignee: Charter Communications Operating, LLC
    Inventors: James Anderson Blackley, Jay Eric Carlson, Michael David Hanrahan, Bajeed Pattan, Christopher Scott Alcott
  • Publication number: 20200265151
    Abstract: In a method for providing secure data storage, a user interface is provided to a user, and a user selection of a plurality of cloaking sequences is received via the user interface. The cloaking sequences include at least a first and second cloaking sequence. The method also includes cloaking data (e.g., one or more files). Cloaking the data includes retrieving a first hidden sequence associated with the first cloaking sequence, and retrieving a second hidden sequence associated with the second cloaking sequence. The second hidden sequence includes an ordered sequence of bit sets each including one or more bits. Cloaking the data also includes using the first hidden sequence to identify offset positions within the data, and using the ordered sequence of bit sets to perform one or more operations on the data at the identified offset positions. The method further includes storing the cloaked data in a database.
    Type: Application
    Filed: February 15, 2019
    Publication date: August 20, 2020
    Inventors: James Anderson Blackley, Jay Eric Carlson, Michael David Hanrahan, Bajeed Pattan, Christopher Scott Alcott
  • Publication number: 20200265170
    Abstract: A method for providing and maintaining secure storage of data includes cloaking the data by retrieving, from a database and using a first set of user-specific cloaking sequences and a first mapping, a first set of hidden sequences, and applying the data and the first set of hidden sequences as inputs to a cloaking algorithm. The cloaked data is stored in a persistent memory. The method further includes, during a later, second time period, re-cloaking the cloaked data by uncloaking the cloaked data using the first set of hidden sequences, retrieving, from the database and using the first set of user-specific cloaking sequences and a different, second mapping, a second set of one or more hidden sequences, and applying the uncloaked data and the second set of hidden sequences as inputs to the cloaking algorithm. The re-cloaked data is stored in the persistent memory.
    Type: Application
    Filed: February 15, 2019
    Publication date: August 20, 2020
    Inventors: James Anderson Blackley, Jay Eric Carlson, Michael David Hanrahan, Bajeed Pattan, Christopher Scott Alcott
  • Patent number: 9749302
    Abstract: In a method for securely collecting sensitive information, a first key entry made via a user interface is detected. Moreover, information is received via a secure communication channel from a remote server, where the information includes at least a current value of a first layer identifier. Using the current value of the first layer identifier, a bit string corresponding to the first key entry is determined. Using the bit string, at least a portion of a data string is generated. The data string is caused to be stored in a local memory and/or transmitted to another device via a network.
    Type: Grant
    Filed: October 7, 2016
    Date of Patent: August 29, 2017
    Assignee: Charter Communications Operating, LLC
    Inventors: Rodney Allen Copeland, Jay Eric Carlson, Michael David Hanrahan, Christopher Scott Alcott
  • Patent number: 9639714
    Abstract: In a method for providing secure communication of a data string along a communication path, a first entity and first identifier, and a second entity and second identifier, are added to a registry database. A current value of the first identifier is provided to a first device to enable a first encoding of the data string, where the first encoding encodes a plurality of bit sequences in the data string as a first plurality of encoded bit sequences. A current value of the second identifier is provided to a second device downstream of the first device to enable a second encoding of the data string, where the second encoding encodes the first plurality of encoded bit sequences as a second plurality of encoded bit sequences. The current values of the first and second identifiers are provided to a third (e.g., destination) device to enable decoding of the data string.
    Type: Grant
    Filed: October 7, 2016
    Date of Patent: May 2, 2017
    Assignee: CHARTER COMMUNICATIONS OPERATING, LLC
    Inventors: Jay Eric Carlson, Rodney Allen Copeland, Michael David Hanrahan, Christopher Scott Alcott