Patents by Inventor E. Easton

E. Easton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8370646
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Grant
    Filed: September 25, 2009
    Date of Patent: February 5, 2013
    Assignee: xSides Corporation
    Inventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
  • Publication number: 20120237029
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” and “replace and restore.
    Type: Application
    Filed: May 1, 2012
    Publication date: September 20, 2012
    Inventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
  • Publication number: 20100077231
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Application
    Filed: September 25, 2009
    Publication date: March 25, 2010
    Inventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
  • Publication number: 20100077360
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Application
    Filed: September 25, 2009
    Publication date: March 25, 2010
    Inventors: D. DAVID NASON, CARSON KAAN, JOHN E. EASTON, JASON M. SMITH, JOHN A. PAINTER, WILLIAM J. HEATON
  • Patent number: 7543232
    Abstract: A system, method and computer program product that combines techniques in the fields of search, data mining, collaborative filtering, user ratings and referral mappings into a system for intelligent web-based help for task or transaction oriented web based systems. The system makes use of a service oriented architecture based on metadata and web services to locate, categorize and provide relevant context sensitive help, including found help not available when the web based system or application was first developed. As part of the inventive system, there is additionally provided a system for providing an integrated information taxonomy which combines automatically, semi-automatically, and manually generated taxonomies and applies them to help systems. This aspect of the invention is applicable to the fields of online self-help systems for web sites and software applications as well as to customer, supplier and employee help desks.
    Type: Grant
    Filed: October 19, 2004
    Date of Patent: June 2, 2009
    Assignee: International Business Machines Corporation
    Inventors: Robert E. Easton, Jr., Neal M. Keller, Juhnyoung Lee, Lisa M. Ungar
  • Publication number: 20070248875
    Abstract: An oxygen-reducing catalyst layer, and a method of making the oxygen-reducing catalyst layer, where the oxygen-reducing catalyst layer includes a catalytic material film disposed on a substrate with the use of physical vapor deposition and thermal treatment. The catalytic material film includes a transition metal that is substantially free of platinum. At least one of the physical vapor deposition and the thermal treatment is performed in a processing environment comprising a nitrogen-containing gas.
    Type: Application
    Filed: April 20, 2006
    Publication date: October 25, 2007
    Inventors: Dennis O'Brien, Alison Schmoeckel, George Vernstrom, Radoslav Atanasoski, Thomas Wood, Ruizhi Yang, E. Easton, Jeffrey Dahn, David O'Neill
  • Patent number: 7007025
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Grant
    Filed: June 10, 2002
    Date of Patent: February 28, 2006
    Assignee: xSides Corporation
    Inventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
  • Patent number: 4656673
    Abstract: The present invention discloses an iron-on pocket for a pocketless shirt or similar article of clothing adapted to receive a pocket wherein a piece of pocket material substantially similar or equivalent to the shirt material and cut in the form of a pocket having a top edge, a bottom edge, a pair of sides a front surface, and a rear surface adapted to be operatively disposed against the surface of the shirt or article of clothing designated to receive the pocket. An attachment device including a first layer adapted to be fixedly secured to the interior surface or folded back edge surface of the pocket material proximate the peripheral edge portions of the bottom and sides of the pocket material and a second thermally-activated or heat responsive adhesive layer is fixedly secured to the first layer and has its rear surface adapted to be disposed against the shirt or clothing material in which the pocket is to be mounted.
    Type: Grant
    Filed: February 11, 1986
    Date of Patent: April 14, 1987
    Inventors: Joseph E. Easton, Michael Snider