Patents by Inventor Douglas Anson

Douglas Anson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11706034
    Abstract: A point-of-sale (POS) system and a data analytic platform provides receipt modification. The POS system has a receipt monitor intercepting receipt data from a POS till. The receipt monitor modifies the receipt data to produce modified receipt data and the receipt monitor transmits the modified receipt data to a receipt printer. A data processing server may receive the receipt from the receipt monitor. The server structures the receipt data, extracts one or more attributes, and may provide modified receipt data to the receipt monitor.
    Type: Grant
    Filed: March 13, 2019
    Date of Patent: July 18, 2023
    Assignee: FOBISUITE TECHNOLOGIES INC.
    Inventors: Robert Douglas Anson, Casey Edward Matson-deKay
  • Publication number: 20210049576
    Abstract: A point-of-sale (POS) system and a data analytic platform provides receipt modification. The POS system has a receipt monitor intercepting receipt data from a POS till. The receipt monitor modifies the receipt data to produce modified receipt data and the receipt monitor transmits the modified receipt data to a receipt printer. A data processing server may receive the receipt from the receipt monitor. The server structures the receipt data, extracts one or more attributes, and may provide modified receipt data to the receipt monitor.
    Type: Application
    Filed: March 13, 2019
    Publication date: February 18, 2021
    Inventors: Robert Douglas Anson, Casey Edward Matson-dekay
  • Patent number: 8325148
    Abstract: A secured communication channel is established between two or more information handling systems by defining attributes for encrypting information with physical inputs made at touch devices of the information handling systems. Inputting the physical gesture at a touch device of each information handling system allows evaluation of one or more attributes at each information handling system so that the shared secret of the physical gesture form the basis for encrypted communications. The touch device includes touch screens or touch pads and the attributes include gesture speed, plural distinct gesture touch points, movement of touch points relative to each other, or other attributes that are determinable from physical gesture inputs at each information handling system.
    Type: Grant
    Filed: April 8, 2009
    Date of Patent: December 4, 2012
    Assignee: Dell Products L.P.
    Inventors: Douglas Anson, Gary Douglas Huber, Yuan-Chang Lo, William Dale Todd Nix, Roy Stedman
  • Publication number: 20100259486
    Abstract: A secured communication channel is established between two or more information handling systems by defining attributes for encrypting information with physical inputs made at touch devices of the information handling systems. Inputting the physical gesture at a touch device of each information handling system allows evaluation of one or more attributes at each information handling system so that the shared secret of the physical gesture form the basis for encrypted communications. The touch device includes touch screens or touch pads and the attributes include gesture speed, plural distinct gesture touch points, movement of touch points relative to each other, or other attributes that are determinable from physical gesture inputs at each information handling system.
    Type: Application
    Filed: April 8, 2009
    Publication date: October 14, 2010
    Inventors: Douglas Anson, Gary Douglas Huber, Yuan-Chang Lo, William Dale Todd Nix, Roy Stedman
  • Publication number: 20100038526
    Abstract: The chemical composition and method of the invention enable characterization of microscopic defects in membranes such as pinholes, cracks or fissures. The present invention, however, can be used to characterize defects on different types of porous and non-porous membranes used for diverse applications in various industries. It uses brightly fluorescing silica or silsesquioxane spheres prepared with pre-determined definitive and uniform sizes (15 nm-50 microns). The spheres' uniform, controlled size allows them to be used to characterize defects or holes in membranes based on a size exclusion mechanism. The spheres used are engineered to glow brightly when exposed to ultraviolet light in order to allow visual or highly sensitive fluorescence spectroscopy or microscopy to characterize the passage of the particles through defects or holes in a membrane and even identify where the defect is located.
    Type: Application
    Filed: August 14, 2008
    Publication date: February 18, 2010
    Inventors: Douglas Anson Loy, Dylan J. Boday, Jason T. Werd
  • Publication number: 20100003204
    Abstract: The invention discloses and claims a new class of chemical compositions with ideal sunscreen properties. The chemical composition comprises spherical particles between 200 nm and 10 microns in diameter prepared by an emulsion polymerization of tetraalkoxysilanes or organotrialkoxysilanes or organobridged trialkoxysilanes with a dye monomer bearing two or more alkoxysilyl groups attached to the bridging chromophore. The resulting spheres absorb ultraviolet light. The dye can be any organic chromophore capable of receiving multiple trialkoxysilyl groups resulting in multipoint covalent attachment that precludes leaching of the dye from the spheres. The formic acid-toluene-monomer emulsion polymerization allows for large-scale (>100 gram) synthesis of monodisperse particles under acidic, non-aqueous conditions without surfactants. The particles less than 1 micron in diameter are smooth as talc to the touch and will provide a smooth formulation for sunscreen creams or lotions.
    Type: Application
    Filed: July 2, 2009
    Publication date: January 7, 2010
    Applicant: Energy Materials Corporation
    Inventors: Douglas Anson Loy, Kenneth J. Shea, Dylan J. Boday, Jason T. Wertz
  • Publication number: 20070283450
    Abstract: A method supports secure input/output (I/O) communications between an I/O device and a data processing system via a keyboard, video, and mouse (KVM) switch. An example embodiment includes the operations of establishing a first secure communication channel between the KVM switch and the I/O device and establishing a second secure communication channel between the KVM switch and the data processing system. In addition, I/O data may be received at the KVM switch from the I/O device via the first secure communication channel. In response to receipt of the I/O data from the I/O device, the I/O data may be transmitted from the KVM switch to the data processing system via the second secure communication channel. Embodiments may also include support for non-secure channels between the KVM switch and non-secured I/O devices, non-secured data processing systems, or both.
    Type: Application
    Filed: August 15, 2007
    Publication date: December 6, 2007
    Applicant: DELL PRODUCTS L.L.P.
    Inventors: Douglas Anson, James Lowery, Frank Molsberry
  • Publication number: 20070242729
    Abstract: Methods and systems are disclosed for ultra-wideband (UWB) secure wireless device pairing. Secure pairing between devices for secure UWB communications is conducted over in-band UWB communications to provide secure pairing without requiring a visual confirmation through a graphical user interface (GUI), in particular, for wireless personal area network (WPAN) communications. The secure in-band pairing of wireless UWB devices over a UWB radio link provides considerable advantages over prior secure pairing techniques.
    Type: Application
    Filed: April 13, 2006
    Publication date: October 18, 2007
    Inventors: Liam Quinn, Douglas Anson, William Todd Nix
  • Publication number: 20070235517
    Abstract: A method and apparatus for ensuring the security of a particular configuration of hardware and software for an information handling system that is assembled using a “build-to-order” system. The present invention ensures the security and integrity of data on an information handling system from the point of manufacture to the final destination at the customer's facility. The information handling system is then manufactured with the operating system and a predetermined set of software being installed thereon. A manifest file is constructed comprising a predetermined set of data files and configuration information. The manifest file is digitally signed with at least one digital key. When the information handling system performs its initial boot, a second digital key, securely stored in a Trusted Platform Module (TPM), is used to extract information from the manifest file and the existing data files and configuration information is compared to the information contained in the manifest file.
    Type: Application
    Filed: March 30, 2006
    Publication date: October 11, 2007
    Inventors: Clint O'Connor, Douglas Anson
  • Publication number: 20070041584
    Abstract: A software activation method is disclosed which uses a two-key paradigm. The method provides increased piracy protection while providing a relatively straight forward process for a user to satisfy a license claim.
    Type: Application
    Filed: August 16, 2005
    Publication date: February 22, 2007
    Inventors: Clint O'Connor, Douglas Anson
  • Publication number: 20060200861
    Abstract: A method and system for modifying a computer's registry so that it is easily cleansed of spyware and other web-installed software. The registry is structured like an ACID type database, and is partitioned so that metadata associated with web-installed software are stored in a special partitioned. The registry also has revision control, so that prior versions can be retrieved and used if the current registry is corrupted.
    Type: Application
    Filed: March 4, 2005
    Publication date: September 7, 2006
    Applicant: DELL PRODUCTS L.P.
    Inventors: Devendra Godbole, Douglas Anson, Paul Ferguson, Steven Spademan
  • Publication number: 20060179293
    Abstract: A method to boot a computer system only to a secured network is disclosed. In accordance with one embodiment, a method to boot a client only to a secured network, includes connecting the client to a secured network server through the secured network, wherein the secured network server functions as an access control list manager and includes an authorization table listing clients authorized to boot an operating system (OS) only if the client is connected to the secured network server. The method further includes transmitting a claim over the secured network from the client to the secured network server such that the client requests authorization to boot. The method further includes validating at the secured network server the claim against the authorization table. The method further includes determining whether the response denies or permits the client authorization to boot the OS.
    Type: Application
    Filed: February 7, 2005
    Publication date: August 10, 2006
    Applicant: Dell Products L.P.
    Inventors: Clint O'Connor, Douglas Anson
  • Publication number: 20060095517
    Abstract: A method and apparatus for improved handling of messages transmitted over a plurality of wireless and wired networks. Electronic mail transmitted by a mail source via an internet connection is received by a server that is operably connected to an intranet that is protected by a firewall. The server adds a timestamp to the incoming email and forwards the email to first information handling system. The server also relays the email to a network operations center (NOC) that transmits a copy of the email via a wireless transmitter. The present invention provides a method and apparatus to selectively prevent transmission of the relayed email by the NOC by sending a cancellation signal to the NOC or by suppressing the relay of the email to the NOC, thereby providing a cost saving and increased efficiency of bandwidth utilization.
    Type: Application
    Filed: October 12, 2004
    Publication date: May 4, 2006
    Inventors: Clint O'Connor, Douglas Anson
  • Publication number: 20060048222
    Abstract: A method and apparatus for ensuring the security of a particular configuration of hardware and software for an information handling system that is assembled using a “build-to-order” system. The present invention ensures the security and integrity of data on an information handling system from the point of manufacture to the final destination at the customer's facility. The information handling system is then manufactured with the operating system and a predetermined set of software being installed thereon. A manifest file is constructed comprising a predetermined set of data files and configuration information. The manifest file is electronically signed with at least one electronic key. When the information handling system performs its initial boot, a second electronic key is used to extract information from the manifest file and the existing data files and configuration information is compared to the information contained in the manifest file.
    Type: Application
    Filed: August 27, 2004
    Publication date: March 2, 2006
    Inventors: Clint O'Connor, Douglas Anson
  • Publication number: 20050033970
    Abstract: A system and method for securing access to memory modules includes a memory module, a virtual memory module, a boot module, and a gatekeeper. The boot module accepts a key and requests for the memory module and provides the requests and the key to the virtual memory module. The virtual memory module is externally accessible by the boot module and accepts the provided key and the requests from the boot module and transmits the requests and the provided key from the boot module to the gatekeeper. The gatekeeper regulates access to the memory module allowing no other components to directly access the memory module. The gatekeeper receives the provided key from the virtual memory module and the gatekeeper authenticates the provided key by comparing it with a stored key stored in secure location. Upon proper authentication of the provided key, the gatekeeper executes the request in the memory module.
    Type: Application
    Filed: August 5, 2003
    Publication date: February 10, 2005
    Applicant: Dell Products L. P.
    Inventors: Douglas Anson, Yuan-Chang Lo, Frank Molsberry, Clint O'Connor, William Sauber
  • Patent number: 5668188
    Abstract: A method of preparing near net shape, monolithic, porous SiC foams is disclosed. Organosilicon precursors are used to produce polymeric gels by thermally induced phase separation, wherein, a sufficiently concentrated solution of an organosilicon polymer is cooled below its solidification temperature to form a gel. Following solvent removal from the gel, the polymer foam is pretreated in an oxygen plasma in order to raise its glass transition temperature. The pretreated foam is then pyrolized in an inert atmosphere to form a SiC foam.
    Type: Grant
    Filed: January 16, 1996
    Date of Patent: September 16, 1997
    Assignee: Sandia Corporation
    Inventors: LeRoy Louis Whinnery, Monte Carl Nichols, David Roger Wheeler, Douglas Anson Loy