Patents by Inventor E. Dywayne Johnson

E. Dywayne Johnson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160044051
    Abstract: Preventing execution of viruses or malware on a computing device includes compiling an inventory recordation of legitimate applications and terminating execution of any application not on the inventory recordation while in a protected mode. An instantaneous and unprompted inventory recordation known as a “snapshot” can be performed by the computer program. A user may further train the computer program to identify legitimate applications routinely accessed by the user and to be updated to the inventory recordation, such that the inventory recordation is personal to the user. After training, the protected mode can be activated. A smart icon graphical user interface is utilized, that automatically toggles between locked and unlocked depending on if the computing device is at risk or not, to place the computing device in a protected or unprotected mode.
    Type: Application
    Filed: October 23, 2015
    Publication date: February 11, 2016
    Applicant: VOODOOSOFT HOLDINGS, LLC
    Inventors: Daniel Earl Butler, E. Dywayne Johnson
  • Patent number: 9197656
    Abstract: Preventing execution of viruses or malware on a computing device includes compiling an inventory recordation of legitimate applications and terminating execution of any application not on the inventory recordation while in a protected mode. An instantaneous and unprompted inventory recordation known as a “snapshot” can be performed by the computer program. A user may further train the computer program to identify legitimate applications routinely accessed by the user and to be updated to the inventory recordation, such that the inventory recordation is personal to the user. After training, the protected mode can be activated. A smart icon graphical user interface is utilized, that automatically toggles between locked and unlocked depending on if the computing device is at risk or not, to place the computing device in a protected or unprotected mode.
    Type: Grant
    Filed: February 21, 2014
    Date of Patent: November 24, 2015
    Assignee: VoodooSoft Holdings, LLC
    Inventors: Daniel Earl Butler, E. Dywayne Johnson
  • Publication number: 20140173735
    Abstract: Preventing execution of viruses or malware on a computing device includes compiling an inventory recordation of legitimate applications and terminating execution of any application not on the inventory recordation while in a protected mode. An instantaneous and unprompted inventory recordation known as a “snapshot” can be performed by the computer program. A user may further train the computer program to identify legitimate applications routinely accessed by the user and to be updated to the inventory recordation, such that the inventory recordation is personal to the user. After training, the protected mode can be activated. A smart icon graphical user interface is utilized, that automatically toggles between locked and unlocked depending on if the computing device is at risk or not, to place the computing device in a protected or unprotected mode.
    Type: Application
    Filed: February 21, 2014
    Publication date: June 19, 2014
    Applicant: VoodooSoft Holdings, LLC
    Inventors: Daniel Earl Butler, E. Dywayne Johnson
  • Publication number: 20140150106
    Abstract: Preventing execution of viruses or malware on a computing device includes compiling an inventory recordation of legitimate applications and terminating execution of any application not on the inventory recordation while in a protected mode. An instantaneous and unprompted inventory recordation known as a “snapshot” can be performed by the computer program. A user may further train the computer program to identify legitimate applications routinely accessed by the user and to be updated to the inventory recordation, such that the inventory recordation is personal to the user. After training, the protected mode can be activated. A smart icon graphical user interface is utilized, that automatically toggles between locked and unlocked depending on if the computing device is at risk or not, to place the computing device in a protected or unprotected mode.
    Type: Application
    Filed: February 3, 2014
    Publication date: May 29, 2014
    Applicant: Voodoo Soft Holdings, LLC
    Inventors: Daniel Earl Butler, E. Dywayne Johnson
  • Publication number: 20120311710
    Abstract: Preventing execution of viruses or malware on a computing device includes compiling an inventory recordation of legitimate applications while in a training mode and terminating execution of any application not on the inventory recordation while in a protected mode. A user may train the computer program to identify legitimate applications routinely accessed by the user and to be updated to the inventory recordation, such that the inventory recordation is personal to the user. After training, the protected mode is activated. While an Internet browser or e-mail client application is activated while in the protected mode, execution of any accessed application that is not uniquely identified on the inventory recordation is terminated.
    Type: Application
    Filed: May 23, 2012
    Publication date: December 6, 2012
    Applicant: VOODOOSOFT HOLDINGS, LLC
    Inventors: Daniel Earl Butler, E. Dywayne Johnson