Patents by Inventor Douglas Anson
Douglas Anson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11706034Abstract: A point-of-sale (POS) system and a data analytic platform provides receipt modification. The POS system has a receipt monitor intercepting receipt data from a POS till. The receipt monitor modifies the receipt data to produce modified receipt data and the receipt monitor transmits the modified receipt data to a receipt printer. A data processing server may receive the receipt from the receipt monitor. The server structures the receipt data, extracts one or more attributes, and may provide modified receipt data to the receipt monitor.Type: GrantFiled: March 13, 2019Date of Patent: July 18, 2023Assignee: FOBISUITE TECHNOLOGIES INC.Inventors: Robert Douglas Anson, Casey Edward Matson-deKay
-
Publication number: 20210049576Abstract: A point-of-sale (POS) system and a data analytic platform provides receipt modification. The POS system has a receipt monitor intercepting receipt data from a POS till. The receipt monitor modifies the receipt data to produce modified receipt data and the receipt monitor transmits the modified receipt data to a receipt printer. A data processing server may receive the receipt from the receipt monitor. The server structures the receipt data, extracts one or more attributes, and may provide modified receipt data to the receipt monitor.Type: ApplicationFiled: March 13, 2019Publication date: February 18, 2021Inventors: Robert Douglas Anson, Casey Edward Matson-dekay
-
Patent number: 8325148Abstract: A secured communication channel is established between two or more information handling systems by defining attributes for encrypting information with physical inputs made at touch devices of the information handling systems. Inputting the physical gesture at a touch device of each information handling system allows evaluation of one or more attributes at each information handling system so that the shared secret of the physical gesture form the basis for encrypted communications. The touch device includes touch screens or touch pads and the attributes include gesture speed, plural distinct gesture touch points, movement of touch points relative to each other, or other attributes that are determinable from physical gesture inputs at each information handling system.Type: GrantFiled: April 8, 2009Date of Patent: December 4, 2012Assignee: Dell Products L.P.Inventors: Douglas Anson, Gary Douglas Huber, Yuan-Chang Lo, William Dale Todd Nix, Roy Stedman
-
Publication number: 20100259486Abstract: A secured communication channel is established between two or more information handling systems by defining attributes for encrypting information with physical inputs made at touch devices of the information handling systems. Inputting the physical gesture at a touch device of each information handling system allows evaluation of one or more attributes at each information handling system so that the shared secret of the physical gesture form the basis for encrypted communications. The touch device includes touch screens or touch pads and the attributes include gesture speed, plural distinct gesture touch points, movement of touch points relative to each other, or other attributes that are determinable from physical gesture inputs at each information handling system.Type: ApplicationFiled: April 8, 2009Publication date: October 14, 2010Inventors: Douglas Anson, Gary Douglas Huber, Yuan-Chang Lo, William Dale Todd Nix, Roy Stedman
-
Publication number: 20100038526Abstract: The chemical composition and method of the invention enable characterization of microscopic defects in membranes such as pinholes, cracks or fissures. The present invention, however, can be used to characterize defects on different types of porous and non-porous membranes used for diverse applications in various industries. It uses brightly fluorescing silica or silsesquioxane spheres prepared with pre-determined definitive and uniform sizes (15 nm-50 microns). The spheres' uniform, controlled size allows them to be used to characterize defects or holes in membranes based on a size exclusion mechanism. The spheres used are engineered to glow brightly when exposed to ultraviolet light in order to allow visual or highly sensitive fluorescence spectroscopy or microscopy to characterize the passage of the particles through defects or holes in a membrane and even identify where the defect is located.Type: ApplicationFiled: August 14, 2008Publication date: February 18, 2010Inventors: Douglas Anson Loy, Dylan J. Boday, Jason T. Werd
-
Publication number: 20100003204Abstract: The invention discloses and claims a new class of chemical compositions with ideal sunscreen properties. The chemical composition comprises spherical particles between 200 nm and 10 microns in diameter prepared by an emulsion polymerization of tetraalkoxysilanes or organotrialkoxysilanes or organobridged trialkoxysilanes with a dye monomer bearing two or more alkoxysilyl groups attached to the bridging chromophore. The resulting spheres absorb ultraviolet light. The dye can be any organic chromophore capable of receiving multiple trialkoxysilyl groups resulting in multipoint covalent attachment that precludes leaching of the dye from the spheres. The formic acid-toluene-monomer emulsion polymerization allows for large-scale (>100 gram) synthesis of monodisperse particles under acidic, non-aqueous conditions without surfactants. The particles less than 1 micron in diameter are smooth as talc to the touch and will provide a smooth formulation for sunscreen creams or lotions.Type: ApplicationFiled: July 2, 2009Publication date: January 7, 2010Applicant: Energy Materials CorporationInventors: Douglas Anson Loy, Kenneth J. Shea, Dylan J. Boday, Jason T. Wertz
-
Publication number: 20070283450Abstract: A method supports secure input/output (I/O) communications between an I/O device and a data processing system via a keyboard, video, and mouse (KVM) switch. An example embodiment includes the operations of establishing a first secure communication channel between the KVM switch and the I/O device and establishing a second secure communication channel between the KVM switch and the data processing system. In addition, I/O data may be received at the KVM switch from the I/O device via the first secure communication channel. In response to receipt of the I/O data from the I/O device, the I/O data may be transmitted from the KVM switch to the data processing system via the second secure communication channel. Embodiments may also include support for non-secure channels between the KVM switch and non-secured I/O devices, non-secured data processing systems, or both.Type: ApplicationFiled: August 15, 2007Publication date: December 6, 2007Applicant: DELL PRODUCTS L.L.P.Inventors: Douglas Anson, James Lowery, Frank Molsberry
-
Publication number: 20070242729Abstract: Methods and systems are disclosed for ultra-wideband (UWB) secure wireless device pairing. Secure pairing between devices for secure UWB communications is conducted over in-band UWB communications to provide secure pairing without requiring a visual confirmation through a graphical user interface (GUI), in particular, for wireless personal area network (WPAN) communications. The secure in-band pairing of wireless UWB devices over a UWB radio link provides considerable advantages over prior secure pairing techniques.Type: ApplicationFiled: April 13, 2006Publication date: October 18, 2007Inventors: Liam Quinn, Douglas Anson, William Todd Nix
-
Publication number: 20070235517Abstract: A method and apparatus for ensuring the security of a particular configuration of hardware and software for an information handling system that is assembled using a “build-to-order” system. The present invention ensures the security and integrity of data on an information handling system from the point of manufacture to the final destination at the customer's facility. The information handling system is then manufactured with the operating system and a predetermined set of software being installed thereon. A manifest file is constructed comprising a predetermined set of data files and configuration information. The manifest file is digitally signed with at least one digital key. When the information handling system performs its initial boot, a second digital key, securely stored in a Trusted Platform Module (TPM), is used to extract information from the manifest file and the existing data files and configuration information is compared to the information contained in the manifest file.Type: ApplicationFiled: March 30, 2006Publication date: October 11, 2007Inventors: Clint O'Connor, Douglas Anson
-
Publication number: 20070041584Abstract: A software activation method is disclosed which uses a two-key paradigm. The method provides increased piracy protection while providing a relatively straight forward process for a user to satisfy a license claim.Type: ApplicationFiled: August 16, 2005Publication date: February 22, 2007Inventors: Clint O'Connor, Douglas Anson
-
Publication number: 20060200861Abstract: A method and system for modifying a computer's registry so that it is easily cleansed of spyware and other web-installed software. The registry is structured like an ACID type database, and is partitioned so that metadata associated with web-installed software are stored in a special partitioned. The registry also has revision control, so that prior versions can be retrieved and used if the current registry is corrupted.Type: ApplicationFiled: March 4, 2005Publication date: September 7, 2006Applicant: DELL PRODUCTS L.P.Inventors: Devendra Godbole, Douglas Anson, Paul Ferguson, Steven Spademan
-
Publication number: 20060179293Abstract: A method to boot a computer system only to a secured network is disclosed. In accordance with one embodiment, a method to boot a client only to a secured network, includes connecting the client to a secured network server through the secured network, wherein the secured network server functions as an access control list manager and includes an authorization table listing clients authorized to boot an operating system (OS) only if the client is connected to the secured network server. The method further includes transmitting a claim over the secured network from the client to the secured network server such that the client requests authorization to boot. The method further includes validating at the secured network server the claim against the authorization table. The method further includes determining whether the response denies or permits the client authorization to boot the OS.Type: ApplicationFiled: February 7, 2005Publication date: August 10, 2006Applicant: Dell Products L.P.Inventors: Clint O'Connor, Douglas Anson
-
Publication number: 20060095517Abstract: A method and apparatus for improved handling of messages transmitted over a plurality of wireless and wired networks. Electronic mail transmitted by a mail source via an internet connection is received by a server that is operably connected to an intranet that is protected by a firewall. The server adds a timestamp to the incoming email and forwards the email to first information handling system. The server also relays the email to a network operations center (NOC) that transmits a copy of the email via a wireless transmitter. The present invention provides a method and apparatus to selectively prevent transmission of the relayed email by the NOC by sending a cancellation signal to the NOC or by suppressing the relay of the email to the NOC, thereby providing a cost saving and increased efficiency of bandwidth utilization.Type: ApplicationFiled: October 12, 2004Publication date: May 4, 2006Inventors: Clint O'Connor, Douglas Anson
-
Publication number: 20060048222Abstract: A method and apparatus for ensuring the security of a particular configuration of hardware and software for an information handling system that is assembled using a “build-to-order” system. The present invention ensures the security and integrity of data on an information handling system from the point of manufacture to the final destination at the customer's facility. The information handling system is then manufactured with the operating system and a predetermined set of software being installed thereon. A manifest file is constructed comprising a predetermined set of data files and configuration information. The manifest file is electronically signed with at least one electronic key. When the information handling system performs its initial boot, a second electronic key is used to extract information from the manifest file and the existing data files and configuration information is compared to the information contained in the manifest file.Type: ApplicationFiled: August 27, 2004Publication date: March 2, 2006Inventors: Clint O'Connor, Douglas Anson
-
Publication number: 20050033970Abstract: A system and method for securing access to memory modules includes a memory module, a virtual memory module, a boot module, and a gatekeeper. The boot module accepts a key and requests for the memory module and provides the requests and the key to the virtual memory module. The virtual memory module is externally accessible by the boot module and accepts the provided key and the requests from the boot module and transmits the requests and the provided key from the boot module to the gatekeeper. The gatekeeper regulates access to the memory module allowing no other components to directly access the memory module. The gatekeeper receives the provided key from the virtual memory module and the gatekeeper authenticates the provided key by comparing it with a stored key stored in secure location. Upon proper authentication of the provided key, the gatekeeper executes the request in the memory module.Type: ApplicationFiled: August 5, 2003Publication date: February 10, 2005Applicant: Dell Products L. P.Inventors: Douglas Anson, Yuan-Chang Lo, Frank Molsberry, Clint O'Connor, William Sauber
-
Patent number: 5668188Abstract: A method of preparing near net shape, monolithic, porous SiC foams is disclosed. Organosilicon precursors are used to produce polymeric gels by thermally induced phase separation, wherein, a sufficiently concentrated solution of an organosilicon polymer is cooled below its solidification temperature to form a gel. Following solvent removal from the gel, the polymer foam is pretreated in an oxygen plasma in order to raise its glass transition temperature. The pretreated foam is then pyrolized in an inert atmosphere to form a SiC foam.Type: GrantFiled: January 16, 1996Date of Patent: September 16, 1997Assignee: Sandia CorporationInventors: LeRoy Louis Whinnery, Monte Carl Nichols, David Roger Wheeler, Douglas Anson Loy