Patents by Inventor Christopher Scott Alcott
Christopher Scott Alcott has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11501025Abstract: A method for providing and maintaining secure storage of target data includes, during a first time period in which a server provides a first mapping between user-specific cloaking sequence elements and hidden sequence elements, cloaking the target data using a first set of user-specific cloaking sequences and the first mapping, and storing the cloaked data in a persistent memory. The method further includes, during a later, second time period in which the server provides a different, second mapping between the user-specific cloaking sequence elements and the hidden sequence elements, re-cloaking the cloaked data using the first set of user-specific cloaking sequences and the second mapping, and storing the re-cloaked data in the persistent memory.Type: GrantFiled: March 19, 2021Date of Patent: November 15, 2022Assignee: Charter Communications Operating, LLCInventors: James Anderson Blackley, Jay Eric Carlson, Michael David Hanrahan, Bajeed Pattan, Christopher Scott Alcott
-
Publication number: 20220035935Abstract: In a method for providing secure data storage, a user selection of a plurality of cloaking sequences is received. The cloaking sequences include at least a first and second cloaking sequence. The method also includes cloaking data (e.g., one or more files). Cloaking the data includes retrieving a first hidden sequence associated with the first cloaking sequence, and retrieving a second hidden sequence associated with the second cloaking sequence. The second hidden sequence includes an ordered sequence of bit sets each including one or more bits. Cloaking the data also includes using the first hidden sequence to identify offset positions within the data, and using the ordered sequence of bit sets to perform one or more operations on the data at the identified offset positions. The method further includes storing the cloaked data.Type: ApplicationFiled: October 12, 2021Publication date: February 3, 2022Inventors: James Anderson Blackley, Jay Eric Carlson, Michael David Hanrahan, Bajeed Pattan, Christopher Scott Alcott
-
Patent number: 11176262Abstract: In a method for providing secure data storage, a user interface is provided to a user, and a user selection of a plurality of cloaking sequences is received via the user interface. The cloaking sequences include at least a first and second cloaking sequence. The method also includes cloaking data (e.g., one or more files). Cloaking the data includes retrieving a first hidden sequence associated with the first cloaking sequence, and retrieving a second hidden sequence associated with the second cloaking sequence. The second hidden sequence includes an ordered sequence of bit sets each including one or more bits. Cloaking the data also includes using the first hidden sequence to identify offset positions within the data, and using the ordered sequence of bit sets to perform one or more operations on the data at the identified offset positions. The method further includes storing the cloaked data in a database.Type: GrantFiled: February 15, 2019Date of Patent: November 16, 2021Assignee: Charter Communications Operating, LLCInventors: James Anderson Blackley, Jay Eric Carlson, Michael David Hanrahan, Bajeed Pattan, Christopher Scott Alcott
-
Publication number: 20210209258Abstract: A method for providing and maintaining secure storage of target data includes, during a first time period in which a server provides a first mapping between user-specific cloaking sequence elements and hidden sequence elements, cloaking the target data using a first set of user-specific cloaking sequences and the first mapping, and storing the cloaked data in a persistent memory. The method further includes, during a later, second time period in which the server provides a different, second mapping between the user-specific cloaking sequence elements and the hidden sequence elements, re-cloaking the cloaked data using the first set of user-specific cloaking sequences and the second mapping, and storing the re-cloaked data in the persistent memory.Type: ApplicationFiled: March 19, 2021Publication date: July 8, 2021Inventors: James Anderson Blackley, Jay Eric Carlson, Michael David Hanrahan, Bajeed Pattan, Christopher Scott Alcott
-
Patent number: 10984137Abstract: A method for providing and maintaining secure storage of data includes cloaking the data by retrieving, from a database and using a first set of user-specific cloaking sequences and a first mapping, a first set of hidden sequences, and applying the data and the first set of hidden sequences as inputs to a cloaking algorithm. The cloaked data is stored in a persistent memory. The method further includes, during a later, second time period, re-cloaking the cloaked data by uncloaking the cloaked data using the first set of hidden sequences, retrieving, from the database and using the first set of user-specific cloaking sequences and a different, second mapping, a second set of one or more hidden sequences, and applying the uncloaked data and the second set of hidden sequences as inputs to the cloaking algorithm. The re-cloaked data is stored in the persistent memory.Type: GrantFiled: February 15, 2019Date of Patent: April 20, 2021Assignee: Charter Communications Operating, LLCInventors: James Anderson Blackley, Jay Eric Carlson, Michael David Hanrahan, Bajeed Pattan, Christopher Scott Alcott
-
Publication number: 20200265151Abstract: In a method for providing secure data storage, a user interface is provided to a user, and a user selection of a plurality of cloaking sequences is received via the user interface. The cloaking sequences include at least a first and second cloaking sequence. The method also includes cloaking data (e.g., one or more files). Cloaking the data includes retrieving a first hidden sequence associated with the first cloaking sequence, and retrieving a second hidden sequence associated with the second cloaking sequence. The second hidden sequence includes an ordered sequence of bit sets each including one or more bits. Cloaking the data also includes using the first hidden sequence to identify offset positions within the data, and using the ordered sequence of bit sets to perform one or more operations on the data at the identified offset positions. The method further includes storing the cloaked data in a database.Type: ApplicationFiled: February 15, 2019Publication date: August 20, 2020Inventors: James Anderson Blackley, Jay Eric Carlson, Michael David Hanrahan, Bajeed Pattan, Christopher Scott Alcott
-
Publication number: 20200265170Abstract: A method for providing and maintaining secure storage of data includes cloaking the data by retrieving, from a database and using a first set of user-specific cloaking sequences and a first mapping, a first set of hidden sequences, and applying the data and the first set of hidden sequences as inputs to a cloaking algorithm. The cloaked data is stored in a persistent memory. The method further includes, during a later, second time period, re-cloaking the cloaked data by uncloaking the cloaked data using the first set of hidden sequences, retrieving, from the database and using the first set of user-specific cloaking sequences and a different, second mapping, a second set of one or more hidden sequences, and applying the uncloaked data and the second set of hidden sequences as inputs to the cloaking algorithm. The re-cloaked data is stored in the persistent memory.Type: ApplicationFiled: February 15, 2019Publication date: August 20, 2020Inventors: James Anderson Blackley, Jay Eric Carlson, Michael David Hanrahan, Bajeed Pattan, Christopher Scott Alcott
-
Patent number: 9749302Abstract: In a method for securely collecting sensitive information, a first key entry made via a user interface is detected. Moreover, information is received via a secure communication channel from a remote server, where the information includes at least a current value of a first layer identifier. Using the current value of the first layer identifier, a bit string corresponding to the first key entry is determined. Using the bit string, at least a portion of a data string is generated. The data string is caused to be stored in a local memory and/or transmitted to another device via a network.Type: GrantFiled: October 7, 2016Date of Patent: August 29, 2017Assignee: Charter Communications Operating, LLCInventors: Rodney Allen Copeland, Jay Eric Carlson, Michael David Hanrahan, Christopher Scott Alcott
-
Patent number: 9639714Abstract: In a method for providing secure communication of a data string along a communication path, a first entity and first identifier, and a second entity and second identifier, are added to a registry database. A current value of the first identifier is provided to a first device to enable a first encoding of the data string, where the first encoding encodes a plurality of bit sequences in the data string as a first plurality of encoded bit sequences. A current value of the second identifier is provided to a second device downstream of the first device to enable a second encoding of the data string, where the second encoding encodes the first plurality of encoded bit sequences as a second plurality of encoded bit sequences. The current values of the first and second identifiers are provided to a third (e.g., destination) device to enable decoding of the data string.Type: GrantFiled: October 7, 2016Date of Patent: May 2, 2017Assignee: CHARTER COMMUNICATIONS OPERATING, LLCInventors: Jay Eric Carlson, Rodney Allen Copeland, Michael David Hanrahan, Christopher Scott Alcott