Patents by Inventor D. David Nason

D. David Nason has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10031950
    Abstract: A computer querying stored information by application of a user-defined importance condition, a preference probability in relation to a user-defined preference condition, and a user-defined target condition is provided. The computer may perform a search operation, filtering operation, and matching operation based on a result of the querying and generate a search result, filtering result, and matching result. The computer may also generate an indication of a ranking of the search result, filtering result, and matching result.
    Type: Grant
    Filed: August 29, 2013
    Date of Patent: July 24, 2018
    Assignee: III Holdings 2, LLC
    Inventors: David G. Ullman, D. David Nason, Michael G. Klasen, Richard A. Lazar
  • Publication number: 20160210288
    Abstract: A machine-controlled method may include a data store storing textual information, numerical information, belief information, estimates, or any combination thereof, and a machine executing a user-initiated or group-initiated query against the stored information. The processor may apply preferences, targets and thresholds by asserting a user-specified query conditions against the information. Responsive to multiple results of the querying, the processor may apply an importance by asserting a user-defined importance condition against the results of the query and may provide an indication of a ranking corresponding to at least one of the results.
    Type: Application
    Filed: August 29, 2013
    Publication date: July 21, 2016
    Applicant: lll Holdings 2, LLC
    Inventors: David G. Ullman, D. David Nason, Michael G. Klasen, Richard A. Lazar
  • Publication number: 20140067795
    Abstract: A machine-controlled method may include a data store storing textual information, numerical information, belief information, estimates, or any combination thereof, and a machine executing a user-initiated or group-initiated query against the stored information. The processor may apply preferences, targets and thresholds by asserting a user-specified query conditions against the information. Responsive to multiple results of the querying, the processor may apply an importance by asserting a user-defined importance condition against the results of the query and may provide an indication of a ranking corresponding to at least one of the results.
    Type: Application
    Filed: August 29, 2013
    Publication date: March 6, 2014
    Applicant: ROBUST DECISIONS, INC.
    Inventors: David G. Ullman, D. David Nason, Michael G. Klasen, Richard A. Lazar
  • Patent number: 8555194
    Abstract: A method for creating and accessing a graphical user interface in the overscan area outside the area of the display normally utilized by the common operating systems. This normal display area is generally known as the “desktop”. The desktop serves as a graphical user interface to the operating system. The desktop displays images representing files, documents and applications available to the user. The desktop is restricted in the common environments to a predetermined set of resolutions (e.g., 640×480, 800×600, 1024×768) as defined by VGA and SVGA standards. Displayable borders outside this area are the overscan area.
    Type: Grant
    Filed: April 27, 2010
    Date of Patent: October 8, 2013
    Inventors: D. David Nason, Thomas C. O'Rourke, J. Scott Campbell
  • Patent number: 8370646
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Grant
    Filed: September 25, 2009
    Date of Patent: February 5, 2013
    Assignee: xSides Corporation
    Inventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
  • Publication number: 20120237029
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” and “replace and restore.
    Type: Application
    Filed: May 1, 2012
    Publication date: September 20, 2012
    Inventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
  • Publication number: 20120185471
    Abstract: A machine-controlled method may include a data store storing textual information, numerical information, belief information, estimates, or any combination thereof, and a machine executing a user-initiated or group-initiated query against the stored information. A processor may apply an importance by asserting a user-defined importance condition against the information. The processor may apply a preference probability by asserting a user-specified preference condition against the information. The processor may assert a user-established target condition against the information. Responsive to a situation awareness activity, the machine may perform an actionable intelligence operation. Responsive to multiple results of the querying, the machine may provide an indication of a ranking corresponding to at least one of the results.
    Type: Application
    Filed: January 18, 2012
    Publication date: July 19, 2012
    Applicant: ROBUST DECISIONS, INC.
    Inventors: David G. Ullman, D. David Nason, Michael G. Klasen, Richard A. Lazar
  • Publication number: 20120185476
    Abstract: A machine-controlled method may include a data store storing textual information, numerical information, belief information, estimates, or any combination thereof, and a machine executing a user-initiated or group-initiated query against the stored information. A processor may apply an importance by asserting a user-defined importance condition against the information. The processor may apply a preference probability by asserting a user-specified preference condition against the information. The processor may assert a user-established target condition against the information. Responsive to a search request, filtering request, collaborative decision making (CDM request), matching request, or situation awareness activity, the machine may perform a search operation, a filtering operation, a CDM operation, a matching operation, or an actionable intelligence operation, respectively.
    Type: Application
    Filed: January 18, 2012
    Publication date: July 19, 2012
    Applicant: ROBUST DECISIONS, INC.
    Inventors: David G. Ullman, D. David Nason, Michael G. Klasen, Richard A. Lazar
  • Publication number: 20120185470
    Abstract: A machine-controlled method may include receiving from a user an importance condition and a preference condition, target condition, or both. A data store may store textual information, numerical information, belief information, estimation data, or any combination thereof. A machine may execute a query against the stored information. A processor may apply an importance by asserting the importance condition against the stored information. The processor may apply a preference probability by asserting the preference condition against the stored information. Alternatively or in addition thereto, the processor may apply the target condition against the stored information. The machine may perform a collaborative decision making (CDM) operation that incorporates at least one result of the querying and provide at least one CDM result based on the CDM operation. Responsive to multiple results of the querying, the machine may provide an indication of a ranking corresponding to at least one of the results.
    Type: Application
    Filed: January 18, 2012
    Publication date: July 19, 2012
    Applicant: ROBUST DECISIONS, INC.
    Inventors: David G. Ullman, D. David Nason, Michael G. Klasen, Richard A. Lazar
  • Publication number: 20120185360
    Abstract: A machine-controlled electronic commerce (e-commerce) method may include receiving from a user an importance condition and a preference condition, target condition, or both. A data store may store textual information, numerical information, belief information, estimation data, or any combination thereof. A machine may execute a query against the stored information. A processor may apply an importance by asserting the importance condition against the stored information. The processor may apply a preference probability by asserting the preference condition against the stored information. Alternatively or in addition thereto, the processor may apply the target condition against the stored information. The machine may perform a search operation that incorporates at least one result of the querying and provide at least one search result based on the search operation. Responsive to multiple results of the querying, the machine may provide an indication of a ranking corresponding to at least one of the results.
    Type: Application
    Filed: January 18, 2012
    Publication date: July 19, 2012
    Applicant: ROBUST DECISIONS, INC.
    Inventors: David G. Ullman, D. David Nason, Michael G. Klasen, Richard A. Lazar
  • Publication number: 20120185468
    Abstract: A machine-controlled method may include receiving from a user an importance condition and a preference condition, target condition, or both. A data store may store textual information, numerical information, belief information, estimation data, or any combination thereof. A machine may execute a query against the stored information. A processor may apply an importance by asserting the importance condition against the stored information. The processor may apply a preference probability by asserting the preference condition against the stored information. Alternatively or in addition thereto, the processor may apply the target condition against the stored information. The machine may perform a matching operation that incorporates at least one result of the querying and provide at least one matching result based on the matching operation. Responsive to multiple results of the querying, the machine may provide an indication of a ranking corresponding to at least one of the results.
    Type: Application
    Filed: January 18, 2012
    Publication date: July 19, 2012
    Applicant: ROBUST DECISIONS, INC.
    Inventors: David G. Ullman, D. David Nason, Michael G. Klasen, Richard A. Lazar
  • Publication number: 20120185469
    Abstract: A machine-controlled method may include receiving from a user an importance condition and a preference condition, target condition, or both. A data store may store textual information, numerical information, belief information, estimation data, or any combination thereof. A machine may execute a query against the stored information. A processor may apply an importance by asserting the importance condition against the stored information. The processor may apply a preference probability by asserting the preference condition against the stored information. The processor may apply the target condition against the stored information. The machine may perform a filtering operation that incorporates at least one result of the querying and provide at least one filtering result based on the filtering operation.
    Type: Application
    Filed: January 18, 2012
    Publication date: July 19, 2012
    Applicant: ROBUST DECISIONS, INC.
    Inventors: David G. Ullman, D. David Nason, Michael G. Klasen, Richard A. Lazar
  • Publication number: 20110221765
    Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces in addition to the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.
    Type: Application
    Filed: September 14, 2010
    Publication date: September 15, 2011
    Applicant: xSides Corporation
    Inventors: D. David Nason, Carson Kaan
  • Publication number: 20110096081
    Abstract: A computer display controller arbitrates between multiple environments in a computer system to apportion display space between the multiple environments. The display controller may be implemented in hardware, firmware, or software, and determines display space allocation based on requests or requirements of each of the environments. If only one environment is active, the display controller may allocate the entire display space to the first environment. When a second environment is activated, display parameters may be dynamically provided to the display controller or previously provided to the display controller for storage and subsequent use. The display controller apportions the total displayable area to accommodate both environments and if necessary alters the display parameters of the first environment to accommodate the display needs of the second environment The process may be extended to additional environments and may operate satisfactorily with computer systems having multiple displays.
    Type: Application
    Filed: January 5, 2011
    Publication date: April 28, 2011
    Applicant: xSides Corporation
    Inventors: Jason M. Smith, D. David Nason
  • Patent number: 7836500
    Abstract: A virus and malware cleaner is generated for a personal computer. Scanning software determines the presence of suspicious attributes resident to the computer. When automated detection of the need for a Custom Cleaner occurs, specific system information, along with information about the suspicious attributes, is included in a Custom Cleaner Request. The request is automatically generated and transmitted to a server for processing. In response a Custom Cleaner may be automatically created from a database of parameterized instructions, then downloaded to the user's computer for execution. Automatic verification of the Custom Cleaner success in removing infected files may be sent to the server. In the event that a Custom Cleaner cannot be generated automatically, an escalation occurs in which a support technician becomes involved in preparing the Custom Cleaner. Escalation data accessed by the support technician may include automatically generated diagnostic hints.
    Type: Grant
    Filed: December 16, 2005
    Date of Patent: November 16, 2010
    Assignee: eAcceleration Corporation
    Inventors: D. David Nason, Joshua Nathaniel Lizon
  • Publication number: 20100077360
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Application
    Filed: September 25, 2009
    Publication date: March 25, 2010
    Inventors: D. DAVID NASON, CARSON KAAN, JOHN E. EASTON, JASON M. SMITH, JOHN A. PAINTER, WILLIAM J. HEATON
  • Publication number: 20100077231
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Application
    Filed: September 25, 2009
    Publication date: March 25, 2010
    Inventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
  • Publication number: 20100064245
    Abstract: A computer display controller arbitrates between multiple environments in a computer system to apportion display space between the multiple environments. The display controller may be implemented in hardware, firmware, or software, and determines display space allocation based on requests or requirements of each of the environments. If only one environment is active, the display controller may allocate the entire display space to the first environment. When a second environment is activated, display parameters may be dynamically provided to the display controller or previously provided to the display controller for storage and subsequent use. The display controller apportions the total displayable area to accommodate both environments and if necessary alters the display parameters of the first environment to accommodate the display needs of the second environment. The process may be extended to additional environments and may operate satisfactorily with computer systems having multiple displays.
    Type: Application
    Filed: September 4, 2009
    Publication date: March 11, 2010
    Applicant: xSides Corporation
    Inventors: Jason M. Smith, D. David Nason
  • Publication number: 20100005396
    Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces in addition to the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.
    Type: Application
    Filed: June 5, 2009
    Publication date: January 7, 2010
    Inventors: D. David Nason, Carson Kaan
  • Publication number: 20090254965
    Abstract: Methods and systems for enhancing the storage and display of video data and other digital content in a set-top box or other television environment so that such data is securely stored and displayed are provided. Example embodiments provide an enhanced display controller (EDC) that executes in an electronic device, such as a set-top box, to provide secure storage and playback of streamed digital content. The EDC creates or identifies a secure storage location and stores the data stream in that secure location in a secure manner, thereby minimizing unauthorized access. In addition, the EDC supports the secure display of the data stream using standard (or proprietary) encryption techniques, and/or obfuscation techniques. The EDC also optionally supports various requirements for complying with the usage limitations typically associated with DRM data content. In one embodiment, the enhanced display controller is a modified set-top display (device) driver that includes a VBI decoder, mechanisms (e.g.
    Type: Application
    Filed: June 15, 2009
    Publication date: October 8, 2009
    Inventors: Jason M. Smith, D. David Nason, John A. Painter, William J. Heaton