Patents by Inventor Craig Stephens

Craig Stephens has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7899690
    Abstract: An Internet enabled, business-to-business computerized transaction system is disclosed in its preferred embodiment for use in providing rental car services for high volume users and comprises an Internet web portal through which the high volume user may access a plurality of service providers including an integrated business computer network for at least one rental vehicle service provider. The rental vehicle services provider computer network is configured to interconnect a geographically diverse plurality of branch offices, cataloguing their available rental vehicles and schedules for same as well as handling all transactional data relating to its business. The Internet web portal provides ubiquitous connectivity and portability for a multi-level business organization who regularly places high volumes of rental purchases with its business partner and also those other service providers who may or may not have the same integrated business computer system and software.
    Type: Grant
    Filed: October 20, 2000
    Date of Patent: March 1, 2011
    Assignee: The Crawford Group, Inc.
    Inventors: Timothy Robert Weinstock, Kimberly Ann DeVallance, Randall Allan Haselhorst, Craig Stephen Kennedy, David Gary Smith, William T. Tingle, Anita K. Klopfenstein
  • Publication number: 20110010929
    Abstract: This invention relates to methods and systems for attaching components to strips of material to form assemblies, e.g., a system for fastening pre-sharpened razor blades to individual support strips on a continuous band of material, such as a metal, to form discrete blade assemblies.
    Type: Application
    Filed: September 23, 2010
    Publication date: January 20, 2011
    Inventors: Matthew J. Guay, Robert Genovisi, Stephen A. Green, Norbert Binkowski, Craig Stephen Vickery, Jon Fraser Ewing, Ingomar JK Summerauer
  • Publication number: 20110015572
    Abstract: A retractable syringe, plunger and releasable needle retaining assembly are provided. The retractable syringe typically has a glass barrel and is prefilled with fluid contents before use. The releasable needle retaining system comprises a retractable needle, a needle seal, a retaining member and an ejector member that is operable to release the retractable needle from the retaining member. The retaining member has a mating surface for mounting to a complementary mating surface of an interior wall of a syringe barrel. The plunger comprises a plunger outer, a plunger rod frangibly connected to a controlling member, a spring and a unitary plunger seal capable of engaging the retractable needle, wherein the plunger rod, plunger outer and the controlling member co-operate to releasably maintain the spring in an initially compressed state. After delivery of fluid contents of the syringe, the plunger forces the ejector member to release the retractable needle from the retaining member.
    Type: Application
    Filed: July 2, 2008
    Publication date: January 20, 2011
    Applicant: UNITRACT SYRINGE PTY LTD
    Inventors: Craig Stephen Thorley, Joseph Hermes Kaal, Chris Rafferty, Richard Sokolov, Ernesto Hueso, Huw Wallis, Steve Chi TRUONG
  • Publication number: 20110009092
    Abstract: A method achieves secure mobile communications by authenticating a mobile device seeking communication with a secure server. The method prescribes steps for generating a code to indicate a plurality of portions of a digital fingerprint to request from the mobile device, each portion representing a different parameter of the mobile device, sending the code to the mobile device, receiving from the mobile device a response code representing the requested plurality of portions of the digital fingerprint, comparing each portion of the received plurality of portions with one or more predetermined codes, and granting the mobile device an access privilege when results of the comparison satisfy a predetermined minimum accuracy.
    Type: Application
    Filed: July 1, 2010
    Publication date: January 13, 2011
    Inventor: Craig Stephen Etchegoyen
  • Publication number: 20110010560
    Abstract: A failover procedure for a computer system includes steps for routing traffic from a routing device to a first server, storing in the routing device data representing a fingerprint of the first server, receiving periodically at the routing device a status message from the first server, detecting at the routing device an invalid status message from the first server by absence of the fingerprint in a status message from the first server within a predetermined time period after last receiving a valid status message, and routing the traffic from the routing device to a second server in response to detecting the invalid status message from the first server. A redundant server system implementing the failover procedure may include servers each capable of generating its fingerprint by reading current system configuration data.
    Type: Application
    Filed: June 10, 2010
    Publication date: January 13, 2011
    Inventor: Craig Stephen Etchegoyen
  • Publication number: 20100332396
    Abstract: A method for selectively allowing participation in an auction, implemented at one or more servers, includes steps for receiving a request to participate in the auction, receiving machine fingerprint data related to the request to participate in the auction, saving the machine fingerprint data in a memory, comparing the machine fingerprint data with previously stored machine fingerprint data, and determining, using the machine fingerprint data, whether to allow the participation in the auction.
    Type: Application
    Filed: June 2, 2010
    Publication date: December 30, 2010
    Inventor: Craig Stephen Etchegoyen
  • Publication number: 20100333207
    Abstract: System and method for auditing for usage of licensed software in which a client executing the software generates and transmits a license key and a covert key to a server via network connection. The license key is transmitted to the server upon activation of the licensed software at the client. The covert key is generated based on at least a portion of the software code activated at the client and is transmitted to the server at random or at predetermined time intervals after transmission of the licensed key so as to avoid detection by a user. The license and covert keys are each associated with a device fingerprint that uniquely identifies the device transmitting each one of the respective keys. Unauthorized software usage at a client is determined at least when a covert key does not correspond to a device fingerprint having an associated license key.
    Type: Application
    Filed: June 18, 2010
    Publication date: December 30, 2010
    Inventor: Craig Stephen Etchegoyen
  • Publication number: 20100332320
    Abstract: Systems and methods for providing conditional authorization to a plurality of client devices to operate licensed software. A client computer generates and sends a device fingerprint and a license identifier to a license server. The device fingerprint uniquely identifies the client device based on user and non-user configurable parameters relating to the client device. The license server determines if authorization of the licensed software for installation or use at the client software would exceed a limit associated with the license. If authorization would not exceed the limit, the license server sends an unlock key to authorize the client device to install or operate the software. If authorization would exceed the limit, the license server sends an unlock key and ad instructions operable to authorize the client device to install or use the software only in connection with the display of advertisements provided by an ad server.
    Type: Application
    Filed: June 18, 2010
    Publication date: December 30, 2010
    Inventors: Joseph Martin Mordetsky, Craig Stephen Etchegoyen
  • Publication number: 20100333213
    Abstract: Methods and systems disclosed herein may be used to determine if licensed software has been previously installed or used on a device by monitoring an identifier associated with the device on which the licensed software is to be installed or used. Prior to operation of licensed software, a client device requires authorization from a license server. The license server may retrieve a unique identifying device fingerprint from the client device to authorize installation of the software based on a probabilistic comparison of the identifier with stored device identifiers subject to a license. If the comparison yields a match and if total instances of retrieval of the retrieved device fingerprint does not exceed licensed rights, the authorization is granted.
    Type: Application
    Filed: June 2, 2010
    Publication date: December 30, 2010
    Inventor: Craig Stephen Etchegoyen
  • Publication number: 20100332400
    Abstract: A method for selectively authorizing a transaction at one or more servers comprises steps for receiving a request to authorize the transaction, receiving machine fingerprint data related to the request to authorize the transaction, saving the machine fingerprint data in a memory, receiving associated payment information related to the request to authorize the transaction, saving the payment information in a memory, retrieving previously stored machine fingerprint data associated with the payment information, comparing the received machine fingerprint data with previously stored machine fingerprint data associated with the payment information, and determining, using the machine fingerprint data, whether to authorize the transaction.
    Type: Application
    Filed: June 2, 2010
    Publication date: December 30, 2010
    Inventor: Craig Stephen Etchegoyen
  • Publication number: 20100332319
    Abstract: A system for dynamically serving ads to one or more client devices in connection with the operation of an executable program. The system comprises a network interface disposed to receive an ad request associated with a device fingerprint that uniquely identifies a client device. The ad request comprises information relating to any one or more of the client device, a user operating the client device and an executable program operating on the client device. The system further comprises a memory and a processor, in communication with the network interface and the memory, the processor configured for operating the program instructions. The program instructions stored in the memory are operable for parsing the information in the ad request, selecting one or more ads based at least in part on the parsed information, and transmitting ad rendering data to cause the one or more ads to be displayed at the client device.
    Type: Application
    Filed: June 18, 2010
    Publication date: December 30, 2010
    Inventor: Craig Stephen Etchegoyen
  • Publication number: 20100333081
    Abstract: A system for remotely updating a program configuration includes an update server in communication with a client device configured to execute a remote update program. The client device includes a first processor coupled to memory storing the program which, executed, performs physical device recognition on the client device to determine its machine parameters, and generates unique device identifiers based thereon, and a first transceiver configured to send the identifiers to the update server. The update server is configured to collect the identifiers from the client device, and includes a second processor for analyzing the identifiers and determining an updated program configuration based on the collected identifiers matching known identifiers, and a second transceiver configured to deliver data representing the updated program configuration to the client device for storage therein.
    Type: Application
    Filed: June 18, 2010
    Publication date: December 30, 2010
    Inventor: Craig Stephen Etchegoyen
  • Publication number: 20100332331
    Abstract: A system for providing an interface for purchasing ad slots in an executable program operable at a plurality of clients. The system comprises a network interface disposed to receive data associated with an ad slot in the executable program and information associated with the plurality of clients operating the executable program, the plurality of clients each identified by a device fingerprint. The system also comprises a memory holding program instructions operable for determining a price for the ad slot based at least on the data and information associated with the plurality of clients and providing an interface for purchasing the ad slots. The interface identifies at least the executable program, the ad slot and the determined price.
    Type: Application
    Filed: June 18, 2010
    Publication date: December 30, 2010
    Inventor: Craig Stephen Etchegoyen
  • Publication number: 20100321208
    Abstract: A system for emergency communications operates as a static network device for selectively receiving traffic control data from a mobile node. The system includes a transceiver for receiving a device identifier over a network from the mobile node, the device identifier derived from a combination of user-configurable and non-user-configurable parameters of the mobile node, and a processor coupled to the transceiver and to memory storing executable code.
    Type: Application
    Filed: June 10, 2010
    Publication date: December 23, 2010
    Inventor: Craig Stephen Etchegoyen
  • Publication number: 20100325704
    Abstract: An embedded system device comprises a processor operatively coupled to a first memory space, a second memory space, and a plurality of user controls. The processor is configured to execute only executable code residing within the first memory space, and the executable code includes authentication routine configured to generate a device identifier based at least upon non-user-configurable parameters of the embedded system device. The second memory space includes user configurable options for use by the processor when executing the executable code. The user controls are adapted to configure the user configurable options within the second memory space, wherein the user controls cannot configure the first memory space.
    Type: Application
    Filed: June 10, 2010
    Publication date: December 23, 2010
    Inventor: Craig Stephen Etchegoyen
  • Publication number: 20100325446
    Abstract: A method for protecting software from tampering includes steps for processing, using a computer, first compiled software stored in a computer memory to generate a cryptographic key, the first compiled software configured to perform software protection functions and defined second functions distinct from the software protection functions when executed by a computer processor, the cryptographic key consisting of a first portion of the first compiled software comprising executable code compiled from the software protection functions, encrypting a second portion of the first compiled software using the cryptographic key to produce second compiled software comprising the first portion in unencrypted form and the second portion encrypted with the cryptographic key, wherein the second portion comprises executable code compiled from the defined second functions, and storing the second compiled software in a computer memory for distribution to a client device.
    Type: Application
    Filed: June 2, 2010
    Publication date: December 23, 2010
    Inventors: Joseph Martin Mordetsky, Craig Stephen Etchegoyen
  • Publication number: 20100325051
    Abstract: A method for reducing piracy in software activation may be implemented on a computer readable medium storing software instructions that execute the method, which includes steps for receiving a media identifier of a media and a device identifier from a first remote device executing the media, the device identifier being based on a combination of a user-configurable parameter and a non-user-configurable parameter of the first remote device, granting a usage license for the media to the first remote device, correlating the usage license with the media identifier and the device identifier, generating a sale metric for the media based on a number of usage license granted, determining a piracy metric of the media based on availability of illegal copies of the media, and charging a publisher of the media a fee based on the sale and piracy metrics.
    Type: Application
    Filed: June 18, 2010
    Publication date: December 23, 2010
    Inventor: Craig Stephen Etchegoyen
  • Publication number: 20100321209
    Abstract: A system and method for traffic information delivery may be implemented as a static network device for sharing information with network nodes. The system includes a processor in communication with a transceiver and memory, the memory containing code that when executed by the processor effects the method steps for determining an occurrence of a traffic incident within a defined distance from the device, establishing communication with a network node, receiving a device identifier over a public network from the network node, the device identifier based on a user-configurable parameter and a non-user-configurable parameter of the network node, establishing in response to the device identifier matching an authorized device identifier corresponding to a known network node, a secure private network with the network node, and sending information about the traffic incident to the network node via the secure private network.
    Type: Application
    Filed: June 10, 2010
    Publication date: December 23, 2010
    Inventor: Craig Stephen Etchegoyen
  • Publication number: 20100325149
    Abstract: A system for auditing the use of software on a computing device comprises a data collection server. In response to a communication link being available between the data collection server and the computing device, the data collection server is configured to: (1) receive from the computing device, via the communication link, data including (a) a software identifier identifying the software, (b) a device identifier identifying the computing device, and (c) an event identifier identifying a usage event performed by the software; (2) access a database storing previously received software identifiers, device identifiers, and event identifiers; and (3) update the database to include the received data. A method for auditing the use of software on a computing device is also disclosed.
    Type: Application
    Filed: June 18, 2010
    Publication date: December 23, 2010
    Inventor: Craig Stephen Etchegoyen
  • Publication number: 20100325150
    Abstract: A system for tracking the use of an application on a computing device comprises a data collection server. In response to a communication link being available between the data collection server and the computing device, the data collection server is configured to: (1) receive from the computing device, via the communication link, data including (a) an application identifier identifying the application, (b) a device identifier identifying the computing device, and (c) an instrumentation call identifier identifying an instrumentation call performed by the application; (2) access a database storing previously received application identifiers, device identifiers, and instrumentation call identifiers; and (3) update the database to include the received data. A method for tracking the use of an application on a computing device is also disclosed.
    Type: Application
    Filed: June 18, 2010
    Publication date: December 23, 2010
    Inventors: Joseph Martin Mordetsky, Craig Stephen Etchegoyen