Patents by Inventor Dwayne A. Carson

Dwayne A. Carson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7100047
    Abstract: A technique for adaptive encryption of digital assets such as computer files. The system model monitors passage of files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such a background process in a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, and aggregates them. A policy engine analyzes sequences of aggregate events to determine when to apply encryption.
    Type: Grant
    Filed: December 31, 2003
    Date of Patent: August 29, 2006
    Assignee: Verdasys, Inc.
    Inventors: Nicholas Stamos, Donato Buccella, Dwayne A. Carson
  • Publication number: 20060123101
    Abstract: A data processing application logging, recording, and reporting process and infrastructure. Compliance with regulatory directives such as HIPAA, internal organizational and corporate, personal information privacy, and other security policies can thus be enforced without the need to recode legacy application software. In one preferred embodiment, a core agent process provides “listener” functionality that captures user input events, such as keyboard and mouse interactions, between a user and a legacy application of interest. The agent obtains instructions for how to deal with such events, accessing information that describes the application's behavior as already captured by an application profiler tool. Keyboard and mouse data entry sequences, screen controls and fields of interest are tagged during application profiling process. This data is stored in application profile developed for each mode of a legacy application.
    Type: Application
    Filed: November 22, 2004
    Publication date: June 8, 2006
    Applicant: Veradasys, Inc.
    Inventors: Donato Buccella, Seth Birnbaum, Nicholas Stamos, Leonard Halio, Dwayne Carson, Luis Fernandes
  • Publication number: 20050060537
    Abstract: A technique for establishing usage control over digital assets such as computer files. The system model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such a background process in a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, and aggregates them. A policy engine analyzes sequences of aggregate events to determine when policy violations occur.
    Type: Application
    Filed: November 12, 2003
    Publication date: March 17, 2005
    Applicant: Verdasys, Inc.
    Inventors: Nicholas Stamos, Seth Birnbaum, Tomas Revesz, Donato Buccella, Keith MacDonald, Dwayne Carson, William Fletcher
  • Publication number: 20040255160
    Abstract: A technique for establishing a perimeter of accountability for usage of digital assets such as data files. The accountability model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such as in the background of a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, aggregates them, and makes reports to a journaling server. The journaling server analyzes sequences of low level events to detect when aggregate events of interest occur, such as “FileEdit”, network file transfers and the like. Reports can be generated to provide an understanding of how digital assets have been accessed, used or communicated by individuals in an enterprise.
    Type: Application
    Filed: November 18, 2003
    Publication date: December 16, 2004
    Applicant: Verdasys, Inc.
    Inventors: Nicholas Stamos, Seth N. Birnbaum, Tomas Revesz, Donato Buccella, Keith A. MacDonald, Dwayne A. Carson, William E. Fletcher
  • Publication number: 20040221172
    Abstract: A technique for adaptive encryption of digital assets such as computer files. The system model monitors passage of files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such a background process in a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, and aggregates them. A policy engine analyzes sequences of aggregate events to determine when to apply encryption.
    Type: Application
    Filed: December 31, 2003
    Publication date: November 4, 2004
    Applicant: Verdasys, Inc.
    Inventors: Nicholas Stamos, Donato Buccella, Dwayne A. Carson
  • Publication number: 20040167921
    Abstract: A technique for efficient representation of dependencies between electronically-stored documents, such as in an enterprise data processing system. A document distribution path is developed as a directional graph that is a representation of the historic dependencies between documents, which is constructed in real time as documents are created. The system preferably maintains a lossy hierarchical representation of the documents indexed in such a way that allows for fast queries for similar but not necessarily equivalent documents. A distribution path, coupled with a document similarity service, can be used to provide a number of applications, such as a security solution that is capable of finding and restricting access to documents that contain information that is similar to other existing files that are known to contain sensitive information.
    Type: Application
    Filed: December 17, 2003
    Publication date: August 26, 2004
    Applicant: Verdasys, Inc.
    Inventors: Dwayne A. Carson, Donato Buccella, Michael Smolsky
  • Publication number: 20030135524
    Abstract: A system for backing up desired data includes a communication link configured to transfer information between the system and a backup storage for storing backed up data, and a processor coupled to the communication link and configured to: determine associated substantive data of the desired data, compare the associated substantive data of the desired data with stored data, and transfer the associated substantive data over the communication link for storage based on the comparison of the associated substantive data with the stored data.
    Type: Application
    Filed: September 5, 2002
    Publication date: July 17, 2003
    Inventors: David A. Cane, Gurami Palagashvili, Michael R. Boucher, Dwayne A. Carson
  • Patent number: 5978805
    Abstract: A method and apparatus is disclosed for synchronizing files stored in memory of two remotely located systems. The system can generate a copy of a source file at the destination location without transferring all the data of the source file. The destination location includes a reference file that can contain similar data as that contained in the source file. The synchronization is accomplished by sending keys (representing reference blocks of data from the reference file) to the source system. At the source system, a portion of each keys called a Feature is compared with portions of source file. If the Features match, a checksum corresponding to the reference block is compared with a check sum corresponding to the source block. If the checksums match, an short message identifying the key and reference block that matched is transmitted to the destination system in order that the reference block can be copied from the reference file in order to build the synchronized file.
    Type: Grant
    Filed: May 14, 1997
    Date of Patent: November 2, 1999
    Assignee: Microcom Systems, Inc.
    Inventor: Dwayne A. Carson