Patents by Inventor D. David Nason
D. David Nason has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10031950Abstract: A computer querying stored information by application of a user-defined importance condition, a preference probability in relation to a user-defined preference condition, and a user-defined target condition is provided. The computer may perform a search operation, filtering operation, and matching operation based on a result of the querying and generate a search result, filtering result, and matching result. The computer may also generate an indication of a ranking of the search result, filtering result, and matching result.Type: GrantFiled: August 29, 2013Date of Patent: July 24, 2018Assignee: III Holdings 2, LLCInventors: David G. Ullman, D. David Nason, Michael G. Klasen, Richard A. Lazar
-
Publication number: 20160210288Abstract: A machine-controlled method may include a data store storing textual information, numerical information, belief information, estimates, or any combination thereof, and a machine executing a user-initiated or group-initiated query against the stored information. The processor may apply preferences, targets and thresholds by asserting a user-specified query conditions against the information. Responsive to multiple results of the querying, the processor may apply an importance by asserting a user-defined importance condition against the results of the query and may provide an indication of a ranking corresponding to at least one of the results.Type: ApplicationFiled: August 29, 2013Publication date: July 21, 2016Applicant: lll Holdings 2, LLCInventors: David G. Ullman, D. David Nason, Michael G. Klasen, Richard A. Lazar
-
Publication number: 20140067795Abstract: A machine-controlled method may include a data store storing textual information, numerical information, belief information, estimates, or any combination thereof, and a machine executing a user-initiated or group-initiated query against the stored information. The processor may apply preferences, targets and thresholds by asserting a user-specified query conditions against the information. Responsive to multiple results of the querying, the processor may apply an importance by asserting a user-defined importance condition against the results of the query and may provide an indication of a ranking corresponding to at least one of the results.Type: ApplicationFiled: August 29, 2013Publication date: March 6, 2014Applicant: ROBUST DECISIONS, INC.Inventors: David G. Ullman, D. David Nason, Michael G. Klasen, Richard A. Lazar
-
Patent number: 8555194Abstract: A method for creating and accessing a graphical user interface in the overscan area outside the area of the display normally utilized by the common operating systems. This normal display area is generally known as the “desktop”. The desktop serves as a graphical user interface to the operating system. The desktop displays images representing files, documents and applications available to the user. The desktop is restricted in the common environments to a predetermined set of resolutions (e.g., 640×480, 800×600, 1024×768) as defined by VGA and SVGA standards. Displayable borders outside this area are the overscan area.Type: GrantFiled: April 27, 2010Date of Patent: October 8, 2013Inventors: D. David Nason, Thomas C. O'Rourke, J. Scott Campbell
-
Patent number: 8370646Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: GrantFiled: September 25, 2009Date of Patent: February 5, 2013Assignee: xSides CorporationInventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
-
Publication number: 20120237029Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” and “replace and restore.Type: ApplicationFiled: May 1, 2012Publication date: September 20, 2012Inventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
-
Publication number: 20120185471Abstract: A machine-controlled method may include a data store storing textual information, numerical information, belief information, estimates, or any combination thereof, and a machine executing a user-initiated or group-initiated query against the stored information. A processor may apply an importance by asserting a user-defined importance condition against the information. The processor may apply a preference probability by asserting a user-specified preference condition against the information. The processor may assert a user-established target condition against the information. Responsive to a situation awareness activity, the machine may perform an actionable intelligence operation. Responsive to multiple results of the querying, the machine may provide an indication of a ranking corresponding to at least one of the results.Type: ApplicationFiled: January 18, 2012Publication date: July 19, 2012Applicant: ROBUST DECISIONS, INC.Inventors: David G. Ullman, D. David Nason, Michael G. Klasen, Richard A. Lazar
-
Publication number: 20120185476Abstract: A machine-controlled method may include a data store storing textual information, numerical information, belief information, estimates, or any combination thereof, and a machine executing a user-initiated or group-initiated query against the stored information. A processor may apply an importance by asserting a user-defined importance condition against the information. The processor may apply a preference probability by asserting a user-specified preference condition against the information. The processor may assert a user-established target condition against the information. Responsive to a search request, filtering request, collaborative decision making (CDM request), matching request, or situation awareness activity, the machine may perform a search operation, a filtering operation, a CDM operation, a matching operation, or an actionable intelligence operation, respectively.Type: ApplicationFiled: January 18, 2012Publication date: July 19, 2012Applicant: ROBUST DECISIONS, INC.Inventors: David G. Ullman, D. David Nason, Michael G. Klasen, Richard A. Lazar
-
Publication number: 20120185470Abstract: A machine-controlled method may include receiving from a user an importance condition and a preference condition, target condition, or both. A data store may store textual information, numerical information, belief information, estimation data, or any combination thereof. A machine may execute a query against the stored information. A processor may apply an importance by asserting the importance condition against the stored information. The processor may apply a preference probability by asserting the preference condition against the stored information. Alternatively or in addition thereto, the processor may apply the target condition against the stored information. The machine may perform a collaborative decision making (CDM) operation that incorporates at least one result of the querying and provide at least one CDM result based on the CDM operation. Responsive to multiple results of the querying, the machine may provide an indication of a ranking corresponding to at least one of the results.Type: ApplicationFiled: January 18, 2012Publication date: July 19, 2012Applicant: ROBUST DECISIONS, INC.Inventors: David G. Ullman, D. David Nason, Michael G. Klasen, Richard A. Lazar
-
Publication number: 20120185360Abstract: A machine-controlled electronic commerce (e-commerce) method may include receiving from a user an importance condition and a preference condition, target condition, or both. A data store may store textual information, numerical information, belief information, estimation data, or any combination thereof. A machine may execute a query against the stored information. A processor may apply an importance by asserting the importance condition against the stored information. The processor may apply a preference probability by asserting the preference condition against the stored information. Alternatively or in addition thereto, the processor may apply the target condition against the stored information. The machine may perform a search operation that incorporates at least one result of the querying and provide at least one search result based on the search operation. Responsive to multiple results of the querying, the machine may provide an indication of a ranking corresponding to at least one of the results.Type: ApplicationFiled: January 18, 2012Publication date: July 19, 2012Applicant: ROBUST DECISIONS, INC.Inventors: David G. Ullman, D. David Nason, Michael G. Klasen, Richard A. Lazar
-
Publication number: 20120185468Abstract: A machine-controlled method may include receiving from a user an importance condition and a preference condition, target condition, or both. A data store may store textual information, numerical information, belief information, estimation data, or any combination thereof. A machine may execute a query against the stored information. A processor may apply an importance by asserting the importance condition against the stored information. The processor may apply a preference probability by asserting the preference condition against the stored information. Alternatively or in addition thereto, the processor may apply the target condition against the stored information. The machine may perform a matching operation that incorporates at least one result of the querying and provide at least one matching result based on the matching operation. Responsive to multiple results of the querying, the machine may provide an indication of a ranking corresponding to at least one of the results.Type: ApplicationFiled: January 18, 2012Publication date: July 19, 2012Applicant: ROBUST DECISIONS, INC.Inventors: David G. Ullman, D. David Nason, Michael G. Klasen, Richard A. Lazar
-
Publication number: 20120185469Abstract: A machine-controlled method may include receiving from a user an importance condition and a preference condition, target condition, or both. A data store may store textual information, numerical information, belief information, estimation data, or any combination thereof. A machine may execute a query against the stored information. A processor may apply an importance by asserting the importance condition against the stored information. The processor may apply a preference probability by asserting the preference condition against the stored information. The processor may apply the target condition against the stored information. The machine may perform a filtering operation that incorporates at least one result of the querying and provide at least one filtering result based on the filtering operation.Type: ApplicationFiled: January 18, 2012Publication date: July 19, 2012Applicant: ROBUST DECISIONS, INC.Inventors: David G. Ullman, D. David Nason, Michael G. Klasen, Richard A. Lazar
-
Publication number: 20110221765Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces in addition to the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.Type: ApplicationFiled: September 14, 2010Publication date: September 15, 2011Applicant: xSides CorporationInventors: D. David Nason, Carson Kaan
-
Publication number: 20110096081Abstract: A computer display controller arbitrates between multiple environments in a computer system to apportion display space between the multiple environments. The display controller may be implemented in hardware, firmware, or software, and determines display space allocation based on requests or requirements of each of the environments. If only one environment is active, the display controller may allocate the entire display space to the first environment. When a second environment is activated, display parameters may be dynamically provided to the display controller or previously provided to the display controller for storage and subsequent use. The display controller apportions the total displayable area to accommodate both environments and if necessary alters the display parameters of the first environment to accommodate the display needs of the second environment The process may be extended to additional environments and may operate satisfactorily with computer systems having multiple displays.Type: ApplicationFiled: January 5, 2011Publication date: April 28, 2011Applicant: xSides CorporationInventors: Jason M. Smith, D. David Nason
-
Patent number: 7836500Abstract: A virus and malware cleaner is generated for a personal computer. Scanning software determines the presence of suspicious attributes resident to the computer. When automated detection of the need for a Custom Cleaner occurs, specific system information, along with information about the suspicious attributes, is included in a Custom Cleaner Request. The request is automatically generated and transmitted to a server for processing. In response a Custom Cleaner may be automatically created from a database of parameterized instructions, then downloaded to the user's computer for execution. Automatic verification of the Custom Cleaner success in removing infected files may be sent to the server. In the event that a Custom Cleaner cannot be generated automatically, an escalation occurs in which a support technician becomes involved in preparing the Custom Cleaner. Escalation data accessed by the support technician may include automatically generated diagnostic hints.Type: GrantFiled: December 16, 2005Date of Patent: November 16, 2010Assignee: eAcceleration CorporationInventors: D. David Nason, Joshua Nathaniel Lizon
-
Publication number: 20100077360Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: September 25, 2009Publication date: March 25, 2010Inventors: D. DAVID NASON, CARSON KAAN, JOHN E. EASTON, JASON M. SMITH, JOHN A. PAINTER, WILLIAM J. HEATON
-
Publication number: 20100077231Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: September 25, 2009Publication date: March 25, 2010Inventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
-
Publication number: 20100064245Abstract: A computer display controller arbitrates between multiple environments in a computer system to apportion display space between the multiple environments. The display controller may be implemented in hardware, firmware, or software, and determines display space allocation based on requests or requirements of each of the environments. If only one environment is active, the display controller may allocate the entire display space to the first environment. When a second environment is activated, display parameters may be dynamically provided to the display controller or previously provided to the display controller for storage and subsequent use. The display controller apportions the total displayable area to accommodate both environments and if necessary alters the display parameters of the first environment to accommodate the display needs of the second environment. The process may be extended to additional environments and may operate satisfactorily with computer systems having multiple displays.Type: ApplicationFiled: September 4, 2009Publication date: March 11, 2010Applicant: xSides CorporationInventors: Jason M. Smith, D. David Nason
-
Publication number: 20100005396Abstract: An alternate display content controller provides a technique for controlling a video display separately from and in addition to the content displayed on the operating system display surface. Where the display is a computer monitor, the alternate display content controller interacts with the computer utility operating system and hardware drivers to control allocation of display space and create and control one or more parallel graphical user interfaces in addition to the operating system desktop. An alternate display content controller may be incorporated in either hardware or software. As software, an alternate display content controller may be an application running on the computer operating system, or may include an operating system kernel of varying complexity ranging from dependent on the utility operating system for hardware system services to a parallel system independent of the utility operating system and capable of supporting dedicated applications.Type: ApplicationFiled: June 5, 2009Publication date: January 7, 2010Inventors: D. David Nason, Carson Kaan
-
Publication number: 20090254965Abstract: Methods and systems for enhancing the storage and display of video data and other digital content in a set-top box or other television environment so that such data is securely stored and displayed are provided. Example embodiments provide an enhanced display controller (EDC) that executes in an electronic device, such as a set-top box, to provide secure storage and playback of streamed digital content. The EDC creates or identifies a secure storage location and stores the data stream in that secure location in a secure manner, thereby minimizing unauthorized access. In addition, the EDC supports the secure display of the data stream using standard (or proprietary) encryption techniques, and/or obfuscation techniques. The EDC also optionally supports various requirements for complying with the usage limitations typically associated with DRM data content. In one embodiment, the enhanced display controller is a modified set-top display (device) driver that includes a VBI decoder, mechanisms (e.g.Type: ApplicationFiled: June 15, 2009Publication date: October 8, 2009Inventors: Jason M. Smith, D. David Nason, John A. Painter, William J. Heaton