Patents by Inventor Christopher Scott Long

Christopher Scott Long has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240330220
    Abstract: Peer-to-peer arrangements between endpoint devices are provided herein. A method includes establishing synthetic devices representing endpoint devices in an address domain associated with a host processor, where the endpoint devices have a different address domain than the host processor. The method also includes forming a peer arrangement between the endpoint devices such that data transfers between the endpoint devices in the different address domain can be initiated by the host processor interfacing with the synthetic devices.
    Type: Application
    Filed: June 12, 2024
    Publication date: October 3, 2024
    Inventors: James Scott Cannata, German Kazakov, Christopher R. Long, Jason Breakstone
  • Patent number: 12038859
    Abstract: Peer-to-peer arrangements between endpoint devices are provided herein. A method includes establishing synthetic devices representing endpoint devices in an address domain associated with a host processor, where the endpoint devices have a different address domain than the host processor. The method also includes forming a peer arrangement between the endpoint devices such that data transfers between the endpoint devices in the different address domain can be initiated by the host processor interfacing with the synthetic devices.
    Type: Grant
    Filed: January 26, 2023
    Date of Patent: July 16, 2024
    Assignee: Liqid Inc.
    Inventors: James Scott Cannata, German Kazakov, Christopher R. Long, Jason Breakstone
  • Patent number: 10506040
    Abstract: One embodiment provides a method, including: receiving, from a client device, a request by a user to access an aggregate service device; authenticating, at the aggregate service device, the user to provide access to at least one remote device; providing, by the aggregate service device, data analogous to data of the at least one remote device; receiving, by the aggregate service device, a selection of data accessible by the user from the at least one remote device; and facilitating data transfer associated with the selection of data. Other aspects are described and claimed.
    Type: Grant
    Filed: October 30, 2014
    Date of Patent: December 10, 2019
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Christopher Donald Oman, Tony Eugene Thompson, Daniel Robert Carter, Christopher Scott Long, Trevin Michael Forkert, Philip L. Childs
  • Publication number: 20160127338
    Abstract: One embodiment provides a method, including: receiving, from a client device, a request by a user to access an aggregate service device; authenticating, at the aggregate service device, the user to provide access to at least one remote device; providing, by the aggregate service device, data analogous to data of the at least one remote device; receiving, by the aggregate service device, a selection of data accessible by the user from the at least one remote device; and facilitating data transfer associated with the selection of data. Other aspects are described and claimed.
    Type: Application
    Filed: October 30, 2014
    Publication date: May 5, 2016
    Inventors: Christopher Donald Oman, Tony Euqene Thompson, Daniel Robert Carter, Christopher Scott Long, Trevin Michael Forket, Philip L. Childs
  • Patent number: 7600133
    Abstract: The present invention provides a method and system of backing up at least one encrypted computer file encrypted by an encryption filter driver running on an operating system of a computer system and restoring at least one encrypted computer file encrypted by an encryption filter driver running on an operating system of a computer system. In an exemplary embodiment, the method and system of backing up at least one encrypted computer file encrypted by an encryption filter driver running on an operating system of a computer system include (1) receiving the filename of the encrypted computer file, (2) starting a backup process for the encrypted computer file, (3) disabling the encryption filter driver for the backup process, (4) backing up the encrypted computer file via the backup process, and (5) reenabling the encryption filter driver for the backup process.
    Type: Grant
    Filed: February 24, 2005
    Date of Patent: October 6, 2009
    Assignee: Lenovo Singapore Pte. Ltd
    Inventors: Christopher Scott Long, Mark Andrew Smith
  • Patent number: 7519784
    Abstract: A computer implemented method, data processing system, and computer usable code are provided for reclaiming backup data storage space in memory. The process receives a selection to reclaim a set of memory locations associated with a set of backup copies of a selected file. The process searches a plurality of memory locations for the set of memory locations associated with the set of backup copies. The process then removes the data associated with the set of backup copies from the set of memory locations to form a set of reclaimed memory locations. The set of reclaimed memory locations are unoccupied by data associated with the set of backup copies of the selected file.
    Type: Grant
    Filed: March 31, 2006
    Date of Patent: April 14, 2009
    Assignee: Lenovo Singapore Pte. Ltd.
    Inventors: Philip Lee Childs, Lee Christopher Highsmith, Christopher Scott Long
  • Patent number: 7167982
    Abstract: A method, system and computer program product for securing decrypted files in a shared environment. A filter driver in a kernel space may be configured to control service requests to encrypted files stored in a shared area, e.g., a shared directory on a disk unit, accessible by multiple users. The filter driver may receive a service request to open an encrypted document in the shared area issued from an authorized user. Upon receiving the encrypted data, the filter driver may decrypt the encrypted data. The filter driver may subsequently store the decrypted data in a file in a non-shared area, e.g., a non-shared directory. The non-shared area may be accessible only by the authorized user that requested access to the encrypted file. By storing the decrypted data in a file in the non-shared area, a file once decrypted may be protected in a file sharing environment.
    Type: Grant
    Filed: September 14, 2001
    Date of Patent: January 23, 2007
    Assignee: Lenovo (Singapore) Pte Ltd.
    Inventors: Scott Thomas Elliott, James Patrick Hoff, Christopher Scott Long, David Rivera, James Peter Ward
  • Publication number: 20030056095
    Abstract: A method, system and computer program product for securing decrypted files in a shared environment. A filter driver in a kernel space may be configured to control service requests to encrypted files stored in a shared area, e.g., a shared directory on a disk unit, accessible by multiple users. The filter driver may receive a service request to open an encrypted document in the shared area issued from an authorized user. Upon receiving the encrypted data, the filter driver may decrypt the encrypted data. The filter driver may subsequently store the decrypted data in a file in a non-shared area, e.g., a non-shared directory. The non-shared area may be accessible only by the authorized user that requested access to the encrypted file. By storing the decrypted data in a file in the non-shared area, a file once decrypted may be protected in a file sharing environment.
    Type: Application
    Filed: September 14, 2001
    Publication date: March 20, 2003
    Applicant: International Business Machines Corporation
    Inventors: Scott Thomas Elliott, James Patrick Hoff, Christopher Scott Long, David Rivera, James Peter Ward
  • Publication number: 20030053630
    Abstract: A method and system for control of key pair usage in a computer system is disclosed. The method and system comprise creating key pair material for utilization with an embedded security chip of the computer system. The key pair material includes tag data. The method and system further includes determining whether the key pair material is bound to the embedded security chip based on the tag data.
    Type: Application
    Filed: September 20, 2001
    Publication date: March 20, 2003
    Applicant: International Business Machines Corporation
    Inventors: Scott Thomas Elliott, James Patrick Hoff, Christopher Scott Long, David Rivera, Andy Llovd Trotter, James Peter Ward
  • Publication number: 20030056109
    Abstract: A method and system for binding a device to a planar is disclosed. According to the preferred embodiment of the method and system of the present invention, a programmable memory chip is provided on the planar and the device is detachably attached to the planar. The method and system further includes using the programmable memory chip to bind the device to the planar.
    Type: Application
    Filed: September 14, 2001
    Publication date: March 20, 2003
    Applicant: International Business Machines Corporation
    Inventors: Scott Thomas Elliott, James Patrick Hoff, Christopher Scott Long, James Peter Ward