Patents by Inventor David Clyde
David Clyde has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240102291Abstract: A method of fabricating panels includes providing an insert having an interior portion with a top portion and a positioning stop opposite the top portion, and an exterior portion including a fastener hem. Further, the method includes placing the insert in a mold such that only the fastener hem and the positioning stop contact the mold and centering the insert in the mold with the top portion and the positioning stop. The method also includes filling the mold with a casting material such that the interior portion is submerged in the casting material including the top portion, but some of the positioning stop is not submerged in the casting material, curing the casting material to form a panel on the insert, and removing the panel form the mold.Type: ApplicationFiled: October 23, 2023Publication date: March 28, 2024Inventors: Stephen W. STEFFES, David J. STUCKY, Andrew Clyde BRANDT, Robert D. SHAW, Nikki J. FULTON
-
Patent number: 11882220Abstract: Data can be protected in a centralized tokenization environment. A security value is received by a central server from a client device. The central server accesses a token table corresponding to the client device and generates a reshuffled static token table from the accessed token table based on the received security value. When the client device subsequently provides data to be protected to the central server, the central server tokenizes the provided data using the reshuffled static token table and stores the tokenized data in a multi-tenant database. By reshuffling token tables using security values unique to client devices, the central server can protect and store data for each of multiple tenants such that if the data of one tenant is compromised, the data of each other tenant is not compromised.Type: GrantFiled: April 29, 2022Date of Patent: January 23, 2024Assignee: PROTEGRITY CORPORATIONInventors: David Clyde Williamson, George Curran, Raul Ortega, Jan Boberg, Rajnish Jain, Yigal Rozenberg
-
Publication number: 20230153544Abstract: Unicode data can be protected in a distributed tokenization environment. Data to be tokenized can be accessed or received by a security server, which instantiates a number of tokenization pipelines for parallel tokenization of the data. Unicode token tables are accessed by the security server, and each tokenization pipeline uses the accessed token tables to tokenization a portion of the data. Each tokenization pipeline performs a set of encoding or tokenization operations in parallel and based at least in part on a value received from another tokenization pipeline. The outputs of the tokenization pipelines are combined, producing tokenized data, which can be provided to a remote computing system for storage or processing.Type: ApplicationFiled: January 17, 2023Publication date: May 18, 2023Inventors: Ulf Mattsson, David Clyde Williamson, Yigal Rozenberg, Vichai Levy, Raul Ortega, Denis Scherbakov, Fredrik Mörtberg
-
Patent number: 11586832Abstract: Unicode data can be protected in a distributed tokenization environment. Data to be tokenized can be accessed or received by a security server, which instantiates a number of tokenization pipelines for parallel tokenization of the data. Unicode token tables are accessed by the security server, and each tokenization pipeline uses the accessed token tables to tokenization a portion of the data. Each tokenization pipeline performs a set of encoding or tokenization operations in parallel and based at least in part on a value received from another tokenization pipeline. The outputs of the tokenization pipelines are combined, producing tokenized data, which can be provided to a remote computing system for storage or processing.Type: GrantFiled: February 17, 2021Date of Patent: February 21, 2023Assignee: PROTEGRITY CORPORATIONInventors: Ulf Mattsson, David Clyde Williamson, Yigal Rozenberg, Vichai Levy, Raul Ortega, Denis Scherbakov, Fredrik Mörtberg
-
Publication number: 20230013306Abstract: A gateway device includes a network interface connected to data sources, and computer instructions, that when executed cause a processor to access data portions from the data sources. The processor accesses classification rules, which are configured to classify a data portion of the plurality of data portions as sensitive data in response to the data portion satisfying the rule. Each rule is associated with a significance factor representative of an accuracy of the classification rule. The processor applies each of the set of classification rules to a data portion to obtain an output of whether the data is sensitive data. The output are weighed by significance factors to produce a set of weighted outputs. The processor determines if the data portion is sensitive data by aggregating the set of weighted outputs, and presents the determination in a user interface. Security operations may also be performed on the data portion.Type: ApplicationFiled: September 15, 2022Publication date: January 19, 2023Inventors: David Clyde Williamson, Vichai Levy, Hans Meijer, Yigal Rozenberg, Lingling Yan
-
Patent number: 11475143Abstract: A gateway device includes a network interface connected to data sources, and computer instructions, that when executed cause a processor to access data portions from the data sources. The processor accesses classification rules, which are configured to classify a data portion of the plurality of data portions as sensitive data in response to the data portion satisfying the rule. Each rule is associated with a significance factor representative of an accuracy of the classification rule. The processor applies each of the set of classification rules to a data portion to obtain an output of whether the data is sensitive data. The output are weighed by significance factors to produce a set of weighted outputs. The processor determines if the data portion is sensitive data by aggregating the set of weighted outputs, and presents the determination in a user interface. Security operations may also be performed on the data portion.Type: GrantFiled: September 12, 2020Date of Patent: October 18, 2022Assignee: Protegrity CorporationInventors: David Clyde Williamson, Vichai Levy, Hans Meijer, Yigal Rozenberg, Lingling Yan
-
Publication number: 20220255746Abstract: Data can be protected in a centralized tokenization environment. A security value is received by a central server from a client device. The central server accesses a token table corresponding to the client device and generates a reshuffled static token table from the accessed token table based on the received security value. When the client device subsequently provides data to be protected to the central server, the central server tokenizes the provided data using the reshuffled static token table and stores the tokenized data in a multi-tenant database. By reshuffling token tables using security values unique to client devices, the central server can protect and store data for each of multiple tenants such that if the data of one tenant is compromised, the data of each other tenant is not compromised.Type: ApplicationFiled: April 29, 2022Publication date: August 11, 2022Inventors: David Clyde Williamson, George Curran, Raul Ortega, Jan Boberg, Rajnish Jain, Yigal Rozenberg
-
Patent number: 11349661Abstract: Data can be protected in a centralized tokenization environment. A security value is received by a central server from a client device. The central server accesses a token table corresponding to the client device and generates a reshuffled static token table from the accessed token table based on the received security value. When the client device subsequently provides data to be protected to the central server, the central server tokenizes the provided data using the reshuffled static token table and stores the tokenized data in a multi-tenant database. By reshuffling token tables using security values unique to client devices, the central server can protect and store data for each of multiple tenants such that if the data of one tenant is compromised, the data of each other tenant is not compromised.Type: GrantFiled: September 21, 2020Date of Patent: May 31, 2022Assignee: PROTEGRITY CORPORATIONInventors: David Clyde Williamson, George Curran, Raul Ortega, Jan Boberg, Rajnish Jain, Yigal Rozenberg
-
Publication number: 20220121768Abstract: Data in a database can be protected, for instance by tokenizing the entries of the database using one or more token tables. To enable searching data within the database without first detokenizing the tokenized database entries, bigrams of each data entry can also be tokenized and stored in association with the tokenized data entry. When a query term is received, the query term can be parsed into bigrams, and each bigram can be tokenized. The tokenized query bigrams can be used to query the database, and tokenized database entries corresponding to tokenized bigrams that match the tokenized query bigrams can be identified and returned as search results.Type: ApplicationFiled: October 2, 2021Publication date: April 21, 2022Inventors: Ulf Mattsson, David Clyde Williamson
-
Publication number: 20220114341Abstract: Unicode data can be protected in a distributed tokenization environment. Data to be tokenized can be accessed or received by a security server, which instantiates a number of tokenization pipelines for parallel tokenization of the data. Unicode token tables are accessed by the security server, and each tokenization pipeline uses the accessed token tables to tokenization a portion of the data. Each tokenization pipeline performs a set of encoding or tokenization operations in parallel and based at least in part on a value received from another tokenization pipeline. The outputs of the tokenization pipelines are combined, producing tokenized data, which can be provided to a remote computing system for storage or processing.Type: ApplicationFiled: February 17, 2021Publication date: April 14, 2022Inventors: Ulf Mattsson, David Clyde Williamson, Yigal Rozenberg, Vichai Levy, Raul Ortega, Denis Scherbakov, Fredrik Mörtberg
-
Publication number: 20210006406Abstract: Data can be protected in a centralized tokenization environment. A security value is received by a central server from a client device. The central server accesses a token table corresponding to the client device and generates a reshuffled static token table from the accessed token table based on the received security value. When the client device subsequently provides data to be protected to the central server, the central server tokenizes the provided data using the reshuffled static token table and stores the tokenized data in a multi-tenant database. By reshuffling token tables using security values unique to client devices, the central server can protect and store data for each of multiple tenants such that if the data of one tenant is compromised, the data of each other tenant is not compromised.Type: ApplicationFiled: September 21, 2020Publication date: January 7, 2021Inventors: David Clyde Williamson, George Curran, Raul Ortega, Jan Boberg, Rajnish Jain, Yigal Rozenberg
-
Publication number: 20200410116Abstract: A gateway device includes a network interface connected to data sources, and computer instructions, that when executed cause a processor to access data portions from the data sources. The processor accesses classification rules, which are configured to classify a data portion of the plurality of data portions as sensitive data in response to the data portion satisfying the rule. Each rule is associated with a significance factor representative of an accuracy of the classification rule. The processor applies each of the set of classification rules to a data portion to obtain an output of whether the data is sensitive data. The output are weighed by significance factors to produce a set of weighted outputs. The processor determines if the data portion is sensitive data by aggregating the set of weighted outputs, and presents the determination in a user interface. Security operations may also be performed on the data portion.Type: ApplicationFiled: September 12, 2020Publication date: December 31, 2020Inventors: David Clyde Williamson, Vichai Levy, Hans Meijer, Yigal Rozenberg, Lingling Yan
-
Patent number: 10819519Abstract: Data can be protected in a centralized tokenization environment. A security value is received by a central server from a client device. The central server accesses a token table corresponding to the client device and generates a reshuffled static token table from the accessed token table based on the received security value. When the client device subsequently provides data to be protected to the central server, the central server tokenizes the provided data using the reshuffled static token table and stores the tokenized data in a multi-tenant database. By reshuffling token tables using security values unique to client devices, the central server can protect and store data for each of multiple tenants such that if the data of one tenant is compromised, the data of each other tenant is not compromised.Type: GrantFiled: November 13, 2018Date of Patent: October 27, 2020Assignee: Protegrity CorporationInventors: David Clyde Williamson, George Curran, Raul Ortega, Jan Boberg, Rajnish Jain, Yigal Rozenberg
-
Patent number: 10810317Abstract: A gateway device includes a network interface connected to data sources, and computer instructions, that when executed cause a processor to access data portions from the data sources. The processor accesses classification rules, which are configured to classify a data portion of the plurality of data portions as sensitive data in response to the data portion satisfying the rule. Each rule is associated with a significance factor representative of an accuracy of the classification rule. The processor applies each of the set of classification rules to a data portion to obtain an output of whether the data is sensitive data. The output are weighed by significance factors to produce a set of weighted outputs. The processor determines if the data portion is sensitive data by aggregating the set of weighted outputs, and presents the determination in a user interface. Security operations may also be performed on the data portion.Type: GrantFiled: February 9, 2018Date of Patent: October 20, 2020Assignee: Protegrity CorporationInventors: David Clyde Williamson, Vichai Levy, Hans Meijer, Yigal Rozenberg, Lingling Yan
-
Publication number: 20200269822Abstract: An air brake controller system for a vehicle trailer associated with a vehicle enables an air brake system of the trailer to be controlled via teleoperation control signals when the vehicle is teleoperated. The air brake controller system comprises a wireless communication device to wirelessly receive brake control signals from the vehicle or directly from a remote teleoperation system. An on-board computer of the air brake controller system processes the brake control signals to generate one or more valve control signals that controls flow of air from a compressed air reservoir into air lines connected to the air brake system of the trailer.Type: ApplicationFiled: February 20, 2020Publication date: August 27, 2020Inventors: Shay Magzimof, David Clyde, Brett Rogers, David Parunakian
-
Patent number: 10599513Abstract: A method for managing data transfer for a plurality of processors. Transfer messages exchanged between processor units and an external node in an integrity manager located in hardware in communication with the processor units and the external node are received. An exchange of the transfer messages is managed by the processor units with the external node based on a selected mode in mixed integrity modes such that redundantly calculated outputs from the processor units in a high integrity mode match.Type: GrantFiled: November 21, 2017Date of Patent: March 24, 2020Assignee: The Boeing CompanyInventors: Wing C. Lee, Sean M. Ramey, Ronald James Koontz, Dick P. Wong, Jackson Chia, Anthony S. Fornabaio, Murali Rangarajan, Clarke Edgar Moore, David Clyde Sharp, Arnold W. Nordsieck, Paul Eugene Denzel
-
Publication number: 20200011179Abstract: An apparatus; the apparatus has in functional combination at least one wall-track, a mechanical piston assembly, a rack and pinion assembly, and a powerer (input force/powering means). It offers a wide range of energy efficiency and environmental benefits in compressors, pumps, generators and other applications. The apparatus is designed to promote efficient energy and be durable in use.Type: ApplicationFiled: July 3, 2018Publication date: January 9, 2020Inventor: David Clyde Russell
-
Patent number: 10528077Abstract: A method for synchronizing processor units. An external synchronizer is communicated with to determine whether an undesired amount of skew is present between a first processor unit and a second processor unit in communication with a synchronization system. The first processor unit is selectively directed to perform an action without generating a needed result such that the undesired amount of skew between the first processor unit and the second processor unit is reduced when the undesired amount of skew is present in the first processor unit. The first processor unit and the second processor unit are associated with each other for a high integrity mode in which integrity checks are performed on corresponding messages generated by the first processor unit and the second processor unit.Type: GrantFiled: November 21, 2017Date of Patent: January 7, 2020Assignee: The Boeing CompanyInventors: Wing C. Lee, Sean M. Ramey, Ronald James Koontz, Dick P. Wong, Jackson Chia, Anthony S. Fornabaio, Murali Rangarajan, Clarke Edgar Moore, David Clyde Sharp, Arnold W. Nordsieck, Paul Eugene Denzel
-
Publication number: 20190155325Abstract: A method for synchronizing processor units. An external synchronizer is communicated with to determine whether an undesired amount of skew is present between a first processor unit and a second processor unit in communication with a synchronization system. The first processor unit is selectively directed to perform an action without generating a needed result such that the undesired amount of skew between the first processor unit and the second processor unit is reduced when the undesired amount of skew is present in the first processor unit. The first processor unit and the second processor unit are associated with each other for a high integrity mode in which integrity checks are performed on corresponding messages generated by the first processor unit and the second processor unit.Type: ApplicationFiled: November 21, 2017Publication date: May 23, 2019Inventors: Wing C. Lee, Sean M. Ramey, Ronald James Koontz, Dick P. Wong, Jackson Chia, Anthony S. Fornabaio, Murali Rangarajan, Clarke Edgar Moore, David Clyde Sharp, Arnold W. Nordsieck, Paul Eugene Denzel
-
Publication number: 20190158288Abstract: Data can be protected in a centralized tokenization environment. A security value is received by a central server from a client device. The central server accesses a token table corresponding to the client device and generates a reshuffled static token table from the accessed token table based on the received security value. When the client device subsequently provides data to be protected to the central server, the central server tokenizes the provided data using the reshuffled static token table and stores the tokenized data in a multi-tenant database. By reshuffling token tables using security values unique to client devices, the central server can protect and store data for each of multiple tenants such that if the data of one tenant is compromised, the data of each other tenant is not compromised.Type: ApplicationFiled: November 13, 2018Publication date: May 23, 2019Inventors: David Clyde Williamson, George Curran, Raul Ortega, Jan Boberg, Rajnish Jain, Yigal Rozenberg