Patents by Inventor Derek Bluestone

Derek Bluestone has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160247246
    Abstract: A Business Continuity Plan Visualization implementation for triggering a set of external technical processes to create event(s) that describes a disaster; specify Plan(s) relevant to the events and assets affected by the event; algorithmically assembling a logical, sequenced set of disaster recovery procedures and tasks based on the impacted location, business process or assets; assignment of these procedures and tasks to personnel and automated procedures responsible for executing them; managing real-time communications (text message, e-mail, push messaging, Text to Speech) delivered to personnel via other computers and smartphones at various locations; and reflecting status of all tasks or procedures as they are completed. The can also provide an in-context editable “view” of Business Continuity Plans specific to each incident responder.
    Type: Application
    Filed: February 18, 2016
    Publication date: August 25, 2016
    Inventors: Derek Bluestone, Laura Owusu-Antwi, Jason Prunty, Ronald Baumann-Erb, Scott LaFave, Kyle Gress, Bhuvana Sundaresan, Patrick Olivares, Francis Buck, Chris Trueblood
  • Publication number: 20150142508
    Abstract: Systems, methods and procedures enabling an incident planner to build and distribute disaster response playbooks to be used by incident responders. Information is excerpted from multiple plan documents (such as disaster recovery, crisis management, business continuity, or emergency response plans) that includes only what are the essential personnel contacts, tasks, and resources needed at time of disaster.
    Type: Application
    Filed: November 21, 2013
    Publication date: May 21, 2015
    Applicant: SunGard Availability Services, LP
    Inventors: Francis Buck, Patrick Olivares, Bhuvana Sundaresan, Derek Bluestone, Gary Cohen
  • Patent number: 8200773
    Abstract: A remote access client is provided for enabling communication between a remote data terminal configured to access a public network, and an enterprise network by way of a VPN tunnel through the public network. The remote access client includes at least one application program interface (API) to receive a first verification of the operating state of a predetermined application of the remote data terminal to enable a connection agent for establishing a point of presence on the public network. Upon connection to the point of presence, the API exchanges data between the remote access client and the predetermined application of the remote data terminal. The remote access client receives a second periodic verification of the operating state of the predetermined application via the API for terminating the connection to the point of presence upon the absence of the second verification.
    Type: Grant
    Filed: September 30, 2002
    Date of Patent: June 12, 2012
    Assignee: Fiberlink Communications Corporation
    Inventors: Derek Bluestone, Clint Adams, Srinivas Yalamarti, Pierre-Philippe Lebel
  • Patent number: 7725589
    Abstract: A computer-implemented method and apparatus prevents unsecured access to a computer over a network by a client running on a remote computer. In one aspect of the present invention, a client policy is stored on the remote computer. The client policy includes a configuration of the remote computer that reduces the likelihood of a security breach of the computer as a result of the remote computer accessing the computer. A request is received from a user for access to the computer. It is verified that the remote computer conforms with the client policy, and the client is connected to said computer.
    Type: Grant
    Filed: April 18, 2008
    Date of Patent: May 25, 2010
    Assignee: Fiberlink Communications Corporation
    Inventors: Blair Gaver Nicodemus, Derek Bluestone, Clinton Adams, Joseph E. Pappano, Howard M. Pressman
  • Publication number: 20080222696
    Abstract: A computer-implemented method and apparatus prevents unsecured access to a computer over a network by a client running on a remote computer. In one aspect of the present invention, a client policy is stored on the remote computer. The client policy includes a configuration of the remote computer that reduces the likelihood of a security breach of the computer as a result of the remote computer accessing the computer. A request is received from a user for access to the computer. It is verified that the remote computer conforms with the client policy, and the client is connected to said computer.
    Type: Application
    Filed: April 18, 2008
    Publication date: September 11, 2008
    Applicant: FIBERLINK COMMUNICATIONS CORPORATION
    Inventors: Blair Gaver Nicodemus, Derek Bluestone, Clinton Adams, Joseph E. Pappano, Howard M. Pressman
  • Patent number: 7395341
    Abstract: A computer-implemented method and apparatus prevents unsecured access to a computer over a network by a client running on a remote computer. In one aspect of the present invention, a client policy is stored on the remote computer. The client policy includes a configuration of the remote computer that reduces the likelihood of a security breach of the computer as a result of the remote computer accessing the computer. A request is received from a user for access to the computer. It is verified that the remote computer conforms with the client policy, and the client is connected to said computer.
    Type: Grant
    Filed: August 16, 2004
    Date of Patent: July 1, 2008
    Assignee: Fiberlink Communications Corporation
    Inventors: Blair Gaver Nicodemus, Derek Bluestone, Clinton Adams, Joseph E. Pappano, Howard M. Pressman
  • Publication number: 20050086492
    Abstract: A computer-implemented method and apparatus provides secured access to a computer. In one aspect of the present invention, credentials are received from a user, the credentials including a user identification and a password. The credentials are encrypted with an encryption algorithm. A request for access to a computer is created, the request for access to the computer including the encrypted credentials. The request for access to the computer is transmitted over a network. Verification is received that access to the computer is granted. Access to the computer is received.
    Type: Application
    Filed: August 16, 2004
    Publication date: April 21, 2005
    Applicant: FIBERLINK COMMUNICATIONS CORPORATION
    Inventors: Blair Nicodemus, Derek Bluestone, Clinton Adams, Joseph Pappano, Howard Pressman
  • Publication number: 20050086510
    Abstract: A computer-implemented method and apparatus prevents unsecured access to a computer over a network by a client running on a remote computer. In one aspect of the present invention, a client policy is stored on the remote computer. The client policy includes a configuration of the remote computer that reduces the likelihood of a security breach of the computer as a result of the remote computer accessing the computer. A request is received from a user for access to the computer. It is verified that the remote computer conforms with the client policy, and the client is connected to said computer.
    Type: Application
    Filed: August 16, 2004
    Publication date: April 21, 2005
    Applicant: FIBERLINK COMMUNICATIONS CORPORATION
    Inventors: Blair Nicodemus, Derek Bluestone, Clinton Adams, Joseph Pappano, Howard Pressman
  • Publication number: 20050081045
    Abstract: A computer-implemented method and apparatus authenticates a user of a remote computer over a network. In one aspect of the present invention, an authentication challenge is received at said remote computer an authentication challenge message from an authentication server over a network, at least a portion of the network including an Internet communication link. A passcode is received at the remote computer. A response message to the authentication challenge is created, the response message including the passcode. The response message is transmitted from the remote computer to the authentication server over the network. The remote computer receives a verification message from the authentication server that the response message is verified.
    Type: Application
    Filed: August 16, 2004
    Publication date: April 14, 2005
    Applicant: FIBERLINK COMMUNICATIONS CORPORATION
    Inventors: Blair Nicodemus, Derek Bluestone, Clinton Adams, Joseph Pappano, Howard Pressman
  • Publication number: 20050022012
    Abstract: A remote access client is provided for enabling communication between a remote data terminal configured to access a public network, and an enterprise network by way of a VPN tunnel through the public network. The remote access client includes at least one application program interface (API) to receive a first verification of the operating state of a predetermined application of the remote data terminal to enable a connection agent for establishing a point of presence on the public network. Upon connection to the point of presence, the API exchanges data between the remote access client and the predetermined application of the remote data terminal. The remote access client receives a second periodic verification of the operating state of the predetermined application via the API for terminating the connection to the point of presence upon the absence of the second verification.
    Type: Application
    Filed: September 30, 2002
    Publication date: January 27, 2005
    Inventors: Derek Bluestone, Clint Adams, Sriniyas Yalamarti, Pierre-Philippe Lebel