Patents by Inventor Donato Buccella
Donato Buccella has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10333908Abstract: This patent is generally directed to a transaction-based secure information delivery system and method referred to as “SEDS” herein. SEDS consists of secure method(s) and infrastructure to transmit sensitive information, such as but not limited to medical information. SEDS may be used instead of email, fax, removable media and other non-secure methods. SEDS also supports a sender/receiver risk-assessment based communication protocol.Type: GrantFiled: February 2, 2016Date of Patent: June 25, 2019Assignee: SecuritiNet Inc.Inventors: Donato Buccella, Daniel E. Geer, Jr., Patrick Harding, Barry J. Kadets, Stephen J. MacLellan, T. Mark Morley
-
Publication number: 20160226840Abstract: This patent is generally directed to a transaction-based secure information delivery system and method referred to as “SEDS” herein. SEDS consists of secure method(s) and infrastructure to transmit sensitive information, such as but not limited to medical information. SEDS may be used instead of email, fax, removable media and other non-secure methods. SEDS also supports a sender/receiver risk-assessment based communication protocol.Type: ApplicationFiled: February 2, 2016Publication date: August 4, 2016Inventors: Donato Buccella, Daniel E. Geer, JR., Patrick Harding, Barry J. Kadets, Stephen J. MacLellan, T. Mark Morley
-
Patent number: 7934091Abstract: A technique for establishing a perimeter of accountability for usage of digital assets such as data files. The accountability model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such as in the background of a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, aggregates them, and makes reports to a journaling server. The journaling server analyzes sequences of low level events to detect when aggregate events of interest occur, such as “FileEdit”, network file transfers and the like. Reports can be generated to provide an understanding of how digital assets have been accessed, used or communicated by individuals in an enterprise.Type: GrantFiled: December 9, 2008Date of Patent: April 26, 2011Assignee: Verdasys, Inc.Inventors: Nicholas Stamos, Seth N. Birnbaum, Tomas Revesz, Jr., Donato Buccella, Keith A. MacDonald, Dwayne A. Carson, William E. Fletcher
-
Patent number: 7814021Abstract: A technique for establishing usage control over digital assets such as computer files. The system model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such a background process in a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, and aggregates them. A policy engine analyzes sequences of aggregate events to determine when policy violations occur.Type: GrantFiled: November 12, 2003Date of Patent: October 12, 2010Assignee: Verdasys, Inc.Inventors: Nicholas Stamos, Seth N. Birnbaum, Tomas Revesz, Jr., Donato Buccella, Keith A. MacDonald, Dwayne A. Carson, William E. Fletcher
-
Publication number: 20090198765Abstract: A technique for establishing a perimeter of accountability for usage of digital assets such as data files. The accountability model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such as in the background of a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, aggregates them, and makes reports to a journaling server. The journaling server analyzes sequences of low level events to detect when aggregate events of interest occur, such as “FileEdit”, network file transfers and the like. Reports can be generated to provide an understanding of how digital assets have been accessed, used or communicated by individuals in an enterprise.Type: ApplicationFiled: December 9, 2008Publication date: August 6, 2009Applicant: Verdasys, Inc.Inventors: Nicholas Stamos, Seth N. Birnbaum, Tomas Revesz, JR., Donato Buccella, Keith A. MacDonald, Dwayne A. Carson, William E. Fletcher
-
Patent number: 7496575Abstract: A data processing application logging, recording, and reporting process and infrastructure. Compliance with regulatory directives such as HIPAA, internal organizational and corporate, personal information privacy, and other security policies can thus be enforced without the need to recode legacy application software. In one preferred embodiment, a core agent process provides “listener” functionality that captures user input events, such as keyboard and mouse interactions, between a user and a legacy application of interest. The agent obtains instructions for how to deal with such events, accessing information that describes the application's behavior as already captured by an application profiler tool. Keyboard and mouse data entry sequences, screen controls and fields of interest are tagged during application profiling process. This data is stored in application profile developed for each mode of a legacy application.Type: GrantFiled: November 22, 2004Date of Patent: February 24, 2009Assignee: Verdasys, Inc.Inventors: Donato Buccella, Seth N. Birnbaum, Nicholas Stamos, Leonard F. Halio, Dwayne Carson, Luis M. Fernandes
-
Patent number: 7490116Abstract: A technique for efficient representation of dependencies between electronically-stored documents, such as in an enterprise data processing system. A document distribution path is developed as a directional graph that is a representation of the historic dependencies between documents, which is constructed in real time as documents are created. The system preferably maintains a lossy hierarchical representation of the documents indexed in such a way that allows for fast queries for similar but not necessarily equivalent documents. A distribution path, coupled with a document similarity service, can be used to provide a number of applications, such as a security solution that is capable of finding and restricting access to documents that contain information that is similar to other existing files that are known to contain sensitive information.Type: GrantFiled: December 17, 2003Date of Patent: February 10, 2009Assignee: Verdasys, Inc.Inventors: Dwayne A. Carson, Donato Buccella, Michael Smolsky
-
Patent number: 7472272Abstract: A technique for establishing a perimeter of accountability for usage of digital assets such as data files. The accountability model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such as in the background of a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, aggregates them, and makes reports to a journaling server. The journaling server analyzes sequences of low level events to detect when aggregate events of interest occur, such as “FileEdit”, network file transfers and the like. Reports can be generated to provide an understanding of how digital assets have been accessed, used or communicated by individuals in an enterprise.Type: GrantFiled: November 18, 2003Date of Patent: December 30, 2008Assignee: Verdasys, Inc.Inventors: Nicholas Stamos, Seth N. Birnbaum, Tomas Revesz, Jr., Donato Buccella, Keith A. MacDonald, Dwayne A. Carson, William E. Fletcher
-
Patent number: 7409547Abstract: A technique for adaptive encryption of digital assets such as computer files. The system model monitors passage of files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such a background process in a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, and aggregates them. A policy engine analyzes sequences of aggregate events to determine when to apply encryption.Type: GrantFiled: August 28, 2006Date of Patent: August 5, 2008Assignee: Verdasys, Inc.Inventors: Nicholas Stamos, Donato Buccella, Dwayne A. Carson
-
Publication number: 20060294373Abstract: A technique for adaptive encryption of digital assets such as computer files. The system model monitors passage of files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such a background process in a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, and aggregates them. A policy engine analyzes sequences of aggregate events to determine when to apply encryption.Type: ApplicationFiled: August 28, 2006Publication date: December 28, 2006Applicant: Verdasys, Inc.Inventors: Nicholas Stamos, Donato Buccella, Dwayne Carson
-
Patent number: 7100047Abstract: A technique for adaptive encryption of digital assets such as computer files. The system model monitors passage of files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such a background process in a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, and aggregates them. A policy engine analyzes sequences of aggregate events to determine when to apply encryption.Type: GrantFiled: December 31, 2003Date of Patent: August 29, 2006Assignee: Verdasys, Inc.Inventors: Nicholas Stamos, Donato Buccella, Dwayne A. Carson
-
Publication number: 20060123101Abstract: A data processing application logging, recording, and reporting process and infrastructure. Compliance with regulatory directives such as HIPAA, internal organizational and corporate, personal information privacy, and other security policies can thus be enforced without the need to recode legacy application software. In one preferred embodiment, a core agent process provides “listener” functionality that captures user input events, such as keyboard and mouse interactions, between a user and a legacy application of interest. The agent obtains instructions for how to deal with such events, accessing information that describes the application's behavior as already captured by an application profiler tool. Keyboard and mouse data entry sequences, screen controls and fields of interest are tagged during application profiling process. This data is stored in application profile developed for each mode of a legacy application.Type: ApplicationFiled: November 22, 2004Publication date: June 8, 2006Applicant: Veradasys, Inc.Inventors: Donato Buccella, Seth Birnbaum, Nicholas Stamos, Leonard Halio, Dwayne Carson, Luis Fernandes
-
Publication number: 20050060537Abstract: A technique for establishing usage control over digital assets such as computer files. The system model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such a background process in a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, and aggregates them. A policy engine analyzes sequences of aggregate events to determine when policy violations occur.Type: ApplicationFiled: November 12, 2003Publication date: March 17, 2005Applicant: Verdasys, Inc.Inventors: Nicholas Stamos, Seth Birnbaum, Tomas Revesz, Donato Buccella, Keith MacDonald, Dwayne Carson, William Fletcher
-
Publication number: 20040255160Abstract: A technique for establishing a perimeter of accountability for usage of digital assets such as data files. The accountability model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such as in the background of a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, aggregates them, and makes reports to a journaling server. The journaling server analyzes sequences of low level events to detect when aggregate events of interest occur, such as “FileEdit”, network file transfers and the like. Reports can be generated to provide an understanding of how digital assets have been accessed, used or communicated by individuals in an enterprise.Type: ApplicationFiled: November 18, 2003Publication date: December 16, 2004Applicant: Verdasys, Inc.Inventors: Nicholas Stamos, Seth N. Birnbaum, Tomas Revesz, Donato Buccella, Keith A. MacDonald, Dwayne A. Carson, William E. Fletcher
-
Publication number: 20040221172Abstract: A technique for adaptive encryption of digital assets such as computer files. The system model monitors passage of files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such a background process in a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, and aggregates them. A policy engine analyzes sequences of aggregate events to determine when to apply encryption.Type: ApplicationFiled: December 31, 2003Publication date: November 4, 2004Applicant: Verdasys, Inc.Inventors: Nicholas Stamos, Donato Buccella, Dwayne A. Carson
-
Publication number: 20040167921Abstract: A technique for efficient representation of dependencies between electronically-stored documents, such as in an enterprise data processing system. A document distribution path is developed as a directional graph that is a representation of the historic dependencies between documents, which is constructed in real time as documents are created. The system preferably maintains a lossy hierarchical representation of the documents indexed in such a way that allows for fast queries for similar but not necessarily equivalent documents. A distribution path, coupled with a document similarity service, can be used to provide a number of applications, such as a security solution that is capable of finding and restricting access to documents that contain information that is similar to other existing files that are known to contain sensitive information.Type: ApplicationFiled: December 17, 2003Publication date: August 26, 2004Applicant: Verdasys, Inc.Inventors: Dwayne A. Carson, Donato Buccella, Michael Smolsky