Patents by Inventor D. Nason
D. Nason has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20100207971Abstract: A method for creating and accessing a graphical user interface in the overscan area outside the area of the display normally utilized by the common operating systems. This normal display area is generally known as the “desktop”. The desktop serves as a graphical user interface to the operating system. The desktop displays images representing files, documents and applications available to the user. The desktop is restricted in the common environments to a predetermined set of resolutions (e.g., 640×480, 800×600, 1024×768) as defined by VGA and SVGA standards. Displayable borders outside this area are the overscan area.Type: ApplicationFiled: April 27, 2010Publication date: August 19, 2010Applicant: xSides CorporationInventors: David D. Nason, Thomas C. O'Rourke, Scott J. Campbell
-
Publication number: 20070143843Abstract: A virus and malware cleaner is generated for a personal computer. Scanning software determines the presence of suspicious attributes resident to the computer. When automated detection of the need for a Custom Cleaner occurs, specific system information, along with information about the suspicious attributes, is included in a Custom Cleaner Request. The request is automatically generated and transmitted to a server for processing. In response a Custom Cleaner may be automatically created from a database of parameterized instructions, then downloaded to the user's computer for execution. Automatic verification of the Custom Cleaner success in removing infected files may/be sent to the server. In the event that a Custom Cleaner cannot be generated automatically, an escalation occurs in which a support technician becomes involved in preparing the Custom Cleaner. Escalation data accessed by the support technician may include automatically generated diagnostic hints.Type: ApplicationFiled: December 16, 2005Publication date: June 21, 2007Applicant: eAcceleration CorporationInventors: D. Nason, Joshua Lizon
-
Publication number: 20060050013Abstract: A method for creating and accessing a graphical user interface in the overscan area outside the area of the display normally visible to users of the common operating systems. This normal display area is generally known as the “desktop”. The desktop serves as the graphical user interface to the operating system. The desktop displays images representing documents and applications available to the user (icons). The desktop is restricted in the common environments to a predetermined set of resolutions (e.g., 640×480, 800×600, 1024×768) as defined by VGA and SuperVGA standards. Displayable borders outside this area are the overscan.Type: ApplicationFiled: September 1, 2005Publication date: March 9, 2006Applicant: xSides CorporationInventors: D. Nason, Thomas O'Rourke, J. Campbell
-
Publication number: 20050204165Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: February 11, 2005Publication date: September 15, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050149486Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: January 25, 2005Publication date: July 7, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050149485Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: January 25, 2005Publication date: July 7, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050108525Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: December 10, 2004Publication date: May 19, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050102264Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: November 18, 2004Publication date: May 12, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050102266Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: December 10, 2004Publication date: May 12, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050086666Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: November 18, 2004Publication date: April 21, 2005Applicant: xSides CorporationInventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
-
Publication number: 20050052473Abstract: A method for creating and accessing a graphical user interface in the overscan area outside the area of the display normally utilized by the common operating systems. This normal display area is generally known as the “desktop”. The desktop serves as a graphical user interface to the operating system. The desktop displays images representing files, documents and applications available to the user. The desktop is restricted in the common environments to a predetermined set of resolutions (e.g., 640×480, 800×600, 1024×768) as defined by VGA and SVGA standards. Displayable borders outside this area are the overscan area.Type: ApplicationFiled: October 21, 2004Publication date: March 10, 2005Applicant: xSides CorporationInventors: D. Nason, Thomas O'Rourke, J. Campbell
-
Patent number: 6828991Abstract: A method for creating and accessing a graphical user interface in the overscan area outside the area of the display normally utilized by the common operating systems. This normal display area is generally known as the “desktop”. The desktop serves as a graphical user interface to the operating system. The desktop displays images representing files, documents and applications available to the user. The desktop is restricted in the common environments to a predetermined set of resolutions (e.g., 640×480, 800×600, 1024×768) as defined by VGA and SVGA standards. Displayable borders outside this area are the overscan area.Type: GrantFiled: September 21, 2001Date of Patent: December 7, 2004Assignee: xSides CorporationInventors: David D Nason, Thomas C O'Rourke, Scott J Campbell
-
Patent number: 6661435Abstract: A method for creating and accessing a graphical user interface in the overscan area outside the area of the display normally utilized by the common operating systems. This normal display area is generally known as the “desktop”. The desktop serves as a graphical user interface to the operating system. The desktop displays images representing files, documents and applications available to the user. The desktop is restricted in the common environments to a predetermined set of resolutions (e.g., 640×480, 800×600, 1024×768) as defined by VGA and SVGA standards. Displayable borders outside this area are the overscan area.Type: GrantFiled: November 14, 2001Date of Patent: December 9, 2003Assignee: xSides CorporationInventors: David D Nason, Thomas C O'Rourke, Scott J Campbell
-
Patent number: 6330010Abstract: A method for creating and accessing a graphical user interface in the overscan area outside the area of the display normally utilized by the common operating systems. This normal display area is generally known as the “desktop”. The desktop serves as a graphical user interface to the operating system. The desktop displays images representing files, documents and applications available to the user. The desktop is restricted in the common environments to a predetermined set of resolutions (e.g., 640×480, 800×600, 1024×768) as defined by VGA and SVGA standards. Displayable borders outside this area are the overscan area.Type: GrantFiled: November 13, 1998Date of Patent: December 11, 2001Assignee: xSides CorporationInventors: David D Nason, Thomas C O'Rourke, Scott J Campbell