Patents by Inventor Dhryl Anton

Dhryl Anton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9948682
    Abstract: Disclosed is a method, a device, and/or a system of a data resource control data structure. In one embodiment, a computer-implemented method includes receiving an authorization request from a device to utilize a protected resource within a datastore. A control policy that defines an authorized context in which the device is authorized to utilize the protected resource is extracted from a security node of a non-hierarchical data structure. The control policy includes a control algorithm and optionally a control dataset. Context values specified in the control algorithm are retrieved to form a context dataset. Utilization of the protected resource is authorized when it is determined by the control algorithm that the context dataset conforms to the authorized context. The security node may organize data into a domain structure that includes a unique identifier, an identity element, a content element, and a context element.
    Type: Grant
    Filed: August 7, 2016
    Date of Patent: April 17, 2018
    Assignee: VESCEL, LLC
    Inventors: Dhryl Anton, Michael McFall
  • Publication number: 20170048253
    Abstract: Disclosed is a method, a device, and/or a system of a data resource control data structure. In one embodiment, a computer-implemented method includes receiving an authorization request from a device to utilize a protected resource within a datastore. A control policy that defines an authorized context in which the device is authorized to utilize the protected resource is extracted from a security node of a non-hierarchical data structure. The control policy includes a control algorithm and optionally a control dataset. Context values specified in the control algorithm are retrieved to form a context dataset. Utilization of the protected resource is authorized when it is determined by the control algorithm that the context dataset conforms to the authorized context. The security node may organize data into a domain structure that includes a unique identifier, an identity element, a content element, and a context element.
    Type: Application
    Filed: August 7, 2016
    Publication date: February 16, 2017
    Inventors: Dhryl Anton, Michael McFall
  • Publication number: 20170034217
    Abstract: Disclosed is a method, a device, and/or a system of authorization of access to a data resource in addition to specific actions to be performed on the data resource based on an authorized context enforced by a use policy. A computer-implemented method includes receiving a use request from a device to use a protected resource. The method extracts from a security node a use policy comprising defining an authorized context for use the protected resource. First, access to the protected resource is authorized when the use request conforms to the authorized context. Use keys are generated and returned to the device for redemption. Second, after the protected resource is streamed to the device, a process of the device monitors use of and enforce ephemerality of the protected resource by maintaining an active use ledger. A use policy update may generate new use terms that are pushed to the device, terminating use.
    Type: Application
    Filed: August 7, 2016
    Publication date: February 2, 2017
    Inventors: Dhryl Anton, Michael McFall
  • Publication number: 20160344550
    Abstract: Disclosed is a method, a device, and/or a system of authentication of a user and/or a device through parallel synchronous update of immutable hash histories. In one embodiment, a computer-implemented method for authentication includes receiving an identity claim from a device that includes a device root hash of a hashed history of the device, referred to as a device hastory. Data of a user profile associated with the device that includes a profile root hash of a profile hastory is retrieved. The device root hash and the profile root hash are compared and determined to be identical to verify an identity of a user and/or a device. A transaction record is generated and deposited as a new block in both in the profile hastory and device hastory. A new profile root hash is computed to evolve the identity of the user profile for a prospective authentication request.
    Type: Application
    Filed: August 7, 2016
    Publication date: November 24, 2016
    Inventors: Dhryl Anton, Michael McFall
  • Publication number: 20160344737
    Abstract: Disclosed is a method, a device, and/or a system of uniqueness and auditing of a data resource through an immutable record of transactions in a hash history. In one embodiment, a method includes maintaining uniqueness of a “data organism” that has a hash history, referred to as a hastory, forming a unique identity based on previous transactions in which the data organism participated. The method may be usable to verify an original of the data organism, control copies, transfer ownership and/or audit the datastore. The hastory includes a set of blocks in a sequential chain, each block including a transaction record. A root hash is unique within the datastore for a given data within each block and a given block order of the sequential chain. A transaction record is deposited as a new block in the sequential and the root hash is re-calculated to evolve identity of the data organism.
    Type: Application
    Filed: August 7, 2016
    Publication date: November 24, 2016
    Inventors: Dhryl Anton, Michael McFall
  • Publication number: 20160063100
    Abstract: Disclosed is a method, a device, a system and/or a manufacture of a semantic data structure. In one embodiment, a physical memory usable to store information within a datastore comprises a number of domains. Each domain includes a unique identifier and organizes data into a domain structure that includes and an identity element, a content element, and a context element, each of which may be implemented as an EAV triplet. A fundamental instantiation of the domain structure contains a primitive data and a relational instantiation of the domain structure contains references to other domains. The references of the content element may be constrained, for example to a directed acyclic graph architecture, while references of the context element may reference any domain. Additional instantiations may build orders of referential structure, provide security and control of data resources within the datastore, and model users and application programs.
    Type: Application
    Filed: June 29, 2015
    Publication date: March 3, 2016
    Inventors: Dhryl Anton, Michael McFall
  • Publication number: 20110125676
    Abstract: A method of performing a product transaction where an owner permits a user to use a product without regard for the creditworthiness of the user. The method includes the step of providing the product to the user by requiring the user to perform at least one preselected task without any regard at any time for the creditworthiness of the user. Also included is the step of preventing the user from using the product if the user does not perform the at least one preselected task. The preventing step is also performed by using a product-control mechanism that allows the owner to remotely control the product if the user does not perform the at least one preselected task. A product-control mechanism is also used to allow the owner to block operation of the product by the requestor.
    Type: Application
    Filed: October 25, 2010
    Publication date: May 26, 2011
    Inventors: Donald Ray,Jr. Cooley, Dhryl Anton
  • Publication number: 20110125675
    Abstract: An economic system does not involve credit or a determination of the creditworthiness of customers/retail business(es) who conduct transactions. The system includes plural no-credit transactions that produce revenue; and a mechanism for securitization of that revenue. A method of conducting an economy includes the steps of making plural no-credit transactions that produce revenue; and securitizing that revenue.
    Type: Application
    Filed: August 20, 2010
    Publication date: May 26, 2011
    Inventors: Donald Ray Cooley, JR., Dhryl Anton
  • Publication number: 20060026022
    Abstract: A method of performing a product transaction where an owner permits a user to use a product without regard for the creditworthiness of the user. The method includes the step of providing the product to the user by requiring the user to perform at least one preselected task without any regard at any time for the creditworthiness of the user. Also included is the step of preventing the user from using the product if the user does not perform the at least one preselected task. The preventing step is also performed by using a product-control mechanism that allows the owner to remotely control the product if the user does not perform the at least one preselected task. A product-control mechanism is also used to allow the owner to block operation of the product by the requestor.
    Type: Application
    Filed: May 20, 2005
    Publication date: February 2, 2006
    Inventors: Donald Cooley, Dhryl Anton
  • Publication number: 20060022792
    Abstract: A method of performing an automobile transaction where an owner permits a user to use an automobile without regard for the creditworthiness of the user. The method includes the step of providing the automobile to the user by requiring the user to perform at least one preselected task without any regard at any time for the creditworthiness of the user. Also included is the step of preventing the user from using the automobile if the user does not perform the at least one preselected task. The preventing step is also performed by using an automobile-control mechanism that allows the owner to remotely control the automobile if the user does not perform the at least one preselected task. An automobile-control mechanism is also used to allow the owner to block operation of the automobile by the requester.
    Type: Application
    Filed: May 20, 2005
    Publication date: February 2, 2006
    Inventors: Donald Cooley, Dhryl Anton
  • Publication number: 20060026027
    Abstract: A product lease system that allows a lessee to lease a product from a lessor, includes a supply of products, and control structure coupled to each of the products. The system also includes lease structure that is operable with the control structure to allow a lessee to lease a desired one of the products without regard to the creditworthiness of the lessee. The control structure is also constructed to allow the lessor to control access to a desired product by a lessee, and it includes communication substructure allowing the lessor and lessee to communicate with each other. The control structure may be constructed with first-communication substructure, allowing the lessor and lessee to communicate with each other after the lessee has leased the product, and second-communication substructure, allowing the lessor to communicate with the product.
    Type: Application
    Filed: May 20, 2005
    Publication date: February 2, 2006
    Inventors: Donald Cooley, Dhryl Anton
  • Publication number: 20060026023
    Abstract: A method of leasing an automobile from a lessor to a lessee, includes the steps of equipping an automobile with a remotely controlled device that can be used to control the automobile, and agreeing to lease the automobile to a lessee without regard to the creditworthiness of the lessee. The equipping step includes a remotely controlled device that can be used to control the automobile, and the agreeing step involves allowing the lessee to lease the automobile if the lessee performs certain preselected, required tasks. The equipping step may also include a communicator that allows the lessor and lessee to communicate with each other after the lessee has leased the automobile. One of the preselected, required tasks of the agreeing step is to make a periodic payment, and wherein the equipping step includes a communicator that allows the lessee to make a payment that is accepted by the lessor.
    Type: Application
    Filed: May 20, 2005
    Publication date: February 2, 2006
    Inventors: Donald Cooley, Dhryl Anton
  • Publication number: 20060026025
    Abstract: A method of leasing a product from a lessor to a lessee, includes the steps of equipping a product with a remotely controlled device that can be used to control the product, and agreeing to lease the product to a lessee without regard to the creditworthiness of the lessee. The equipping step includes a remotely controlled device that can be used to control the product, and the agreeing step involves allowing the lessee to lease the product if the lessee performs certain preselected, required tasks. The equipping step may also include a communicator that allows the lessor and lessee to communicate with each other after the lessee has leased the product. One of the preselected, required tasks of the agreeing step is to make a periodic payment, and wherein the equipping step includes a communicator that allows the lessee to make a payment that is accepted by the lessor.
    Type: Application
    Filed: May 20, 2005
    Publication date: February 2, 2006
    Inventors: Donald Cooley, Dhryl Anton
  • Publication number: 20060026021
    Abstract: A method of allowing an owner to permit use of a product by a requestor regardless of creditworthiness includes the steps of receiving a request from a requestor, and providing the product to the requestor. The providing step involves requiring the requestor to agree to perform preselected tasks required by the owner, and preventing the requestor from using the product if the requestor does not perform at least one of the preselected tasks. The method also includes the step of performing the providing step without any regard for the creditworthiness of the requestor. The method also includes using a product-assurance mechanism that allows the owner to remotely control the product if the user does not perform the at least one preselected task. A product-control mechanism is also used to allow the owner to block operation of the product by the requestor.
    Type: Application
    Filed: May 20, 2005
    Publication date: February 2, 2006
    Inventors: Donald Cooley, Dhryl Anton
  • Publication number: 20060026026
    Abstract: A method of allowing an owner to permit use of an automobile by a requestor regardless of creditworthiness includes the steps of receiving a request from a requestor, and providing the automobile to the requester. The providing step involves requiring the requestor to agree to perform preselected tasks required by the owner, and preventing the requestor from using the automobile if the requestor does not perform at least one of the preselected tasks. The method also includes the step of performing the providing step without any regard for the creditworthiness of the requestor. The method also includes using an automobile-assurance mechanism that allows the owner to remotely control the automobile if the user does not perform the at least one preselected task. An automobile-control mechanism is also used to allow the owner to block operation of the automobile by the requestor.
    Type: Application
    Filed: May 20, 2005
    Publication date: February 2, 2006
    Inventors: Donald Cooley, Dhryl Anton
  • Publication number: 20060026068
    Abstract: An automobile marketing system that allows a marketer to market automobiles to consumers includes a supply of automobiles and control structure coupled to each of the automobiles. Also included is marketing structure designed to communicate to consumers about the automobiles and about how a consumer can obtain access to a desired one of the automobiles without regard to the creditworthiness of the consumer. The control structure allows the marketer to control access to a desired automobile by a consumer, and that controlled access may be based upon whether the consumer performs certain preselected, required tasks. The control structure also includes communication substructure allowing the marketer and consumer to communicate with each other after the consumer has obtained access to the automobile. One of the preselected, required tasks may be to make a periodic payment, and the control structure is then constructed to allow the consumer to make a payment that is accepted by the marketer.
    Type: Application
    Filed: May 20, 2005
    Publication date: February 2, 2006
    Inventors: Donald Cooley, Dhryl Anton
  • Publication number: 20060026066
    Abstract: A product marketing system that allows a marketer to market products to consumers including a supply of products and control structure coupled to each of the products. Also included is marketing structure designed to communicate to consumers about the products and about how a consumer can obtain access to a desired one of the products without regard to the creditworthiness of the consumer. The control structure allows the marketer to control access to a desired product by a consumer, and that controlled access may be based upon whether the consumer performs certain preselected, required tasks. The control structure also includes communication substructure allowing the marketer and consumer to communicate with each other after the consumer has obtained access to the product. One of the preselected, required tasks may be to make a periodic payment, and the control structure is then constructed to allow the consumer to make a payment that is accepted by the marketer.
    Type: Application
    Filed: May 20, 2005
    Publication date: February 2, 2006
    Inventors: Donald Cooley, Dhryl Anton
  • Publication number: 20060026024
    Abstract: An automobile lease system that allows a lessee to lease an automobile from a lessor, includes a supply of automobiles, and control structure coupled to each of the automobiles. The system also includes lease structure that is operable with the control structure to allow a lessee to lease a desired one of the automobiles without regard to the creditworthiness of the lessee. The control structure is also constructed to allow the lessor to control access to a desired automobile by a lessee, and it includes communication substructure allowing the lessor and lessee to communicate with each other. The control structure may be constructed with first-communication substructure, allowing the lessor and lessee to communicate with each other after the lessee has leased the automobile, and second-communication substructure, allowing the lessor to communicate with the automobile.
    Type: Application
    Filed: May 20, 2005
    Publication date: February 2, 2006
    Inventors: Donald Cooley, Dhryl Anton