Patents by Inventor Elliot D. Lewis

Elliot D. Lewis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10157286
    Abstract: Aspects of the present invention provide the ability to enforce access methods on data based upon a policy or policies identified within the metadata of a file. The data is self-protected by including or being wrapped with one or more policy/rule identifiers that act as a form of body armor to the data when in transit or in different situations. In embodiments, access is only granted upon successful authentication and compliance with the identified policy or policies. In embodiments, depending upon the conditions and policies, varying level access may be granted. In embodiments, depending upon the conditions and policies, the system may take one or more mitigations or remedial access levels, such as containerizing, sandboxing, granting limited access, or erasing the data.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: December 18, 2018
    Assignee: DELL PRODUCTS LP
    Inventors: Chad Skipper, Elliot D. Lewis, David Konetski, Christopher Burchett, Richard William Schuckle, James Michael Burke, Warren Wade Robbins, Carrie Elaine Gates
  • Patent number: 10089482
    Abstract: Aspects of the present invention provide the ability to enforce access methods on data based upon a policy or policies identified within the metadata of a file. The data is self-protected by including or being wrapped with one or more policy/rule identifiers that act as a form of body armor to the data when in transit or in different situations. In embodiments, access is only granted upon successful authentication and compliance with the identified policy or policies. In embodiments, depending upon the conditions and policies, varying level access may be granted. In embodiments, depending upon the conditions and policies, the system may take one or more mitigations or remedial access levels, such as containerizing, sandboxing, granting limited access, or erasing the data.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: October 2, 2018
    Assignee: DELL PRODUCTS LP
    Inventors: Chad Skipper, Elliot D. Lewis, David Konetski, Christopher Burchett, Richard William Schuckle, James Michael Burke, Warren Wade Robbins, Carrie Elaine Gates
  • Publication number: 20170039378
    Abstract: Aspects of the present invention provide the ability to enforce access methods on data based upon a policy or policies identified within the metadata of a file. The data is self-protected by including or being wrapped with one or more policy/rule identifiers that act as a form of body armor to the data when in transit or in different situations. In embodiments, access is only granted upon successful authentication and compliance with the identified policy or policies. In embodiments, depending upon the conditions and policies, varying level access may be granted. In embodiments, depending upon the conditions and policies, the system may take one or more mitigations or remedial access levels, such as containerizing, sandboxing, granting limited access, or erasing the data.
    Type: Application
    Filed: December 18, 2015
    Publication date: February 9, 2017
    Applicant: DELL PRODUCTS L.P.
    Inventors: Chad Skipper, Elliot D. Lewis, David Konetski, Christopher Burchett, Richard William Schuckle, James Michael Burke, Warren Wade Robbins, Carrie Elaine Gates
  • Publication number: 20170039376
    Abstract: Aspects of the present invention provide the ability to enforce access methods on data based upon a policy or policies identified within the metadata of a file. The data is self-protected by including or being wrapped with policies/rules that act as a form of body armor to the data when in transit or in different situations. In embodiments, access is only granted upon successful authentication and compliance with the identified policy or policies. In embodiments, depending upon the conditions and policies, varying level access may be granted. In embodiments, depending upon the conditions and policies, the system may take one or more mitigations or remedial access levels, such as containerizing, sandboxing, granting limited access, or erasing the data.
    Type: Application
    Filed: August 5, 2015
    Publication date: February 9, 2017
    Applicant: DELL PRODUCTS L.P.
    Inventors: Chad Skipper, Elliot D. Lewis, David Konetski, Christopher Burchett, Richard William Schuckle, James Michael Burke, Warren Wade Robbins, Carrie Elaine Gates
  • Publication number: 20170039379
    Abstract: Aspects of the present invention provide the ability to enforce access methods on data based upon a policy or policies identified within the metadata of a file. The data is self-protected by including or being wrapped with one or more policy/rule identifiers that act as a form of body armor to the data when in transit or in different situations. In embodiments, access is only granted upon successful authentication and compliance with the identified policy or policies. In embodiments, depending upon the conditions and policies, varying level access may be granted. In embodiments, depending upon the conditions and policies, the system may take one or more mitigations or remedial access levels, such as containerizing, sandboxing, granting limited access, or erasing the data.
    Type: Application
    Filed: December 18, 2015
    Publication date: February 9, 2017
    Applicant: DELL PRODUCTS L.P.
    Inventors: Chad Skipper, Elliot D. Lewis, David Konetski, Christopher Burchett, Richard William Schuckle, James Michael Burke, Warren Wade Robbins, Carrie Elaine Gates
  • Patent number: 7533407
    Abstract: A client quarantine agent requests bill of health from a quarantine server, and receives a manifest of checks that the client computer must perform. The quarantine agent then sends a status report on the checks back to the quarantine server. If the client computer is in a valid security state, the bill of health is issued to the client. If the client computer is in an invalid state, the client is directed to install the appropriate software/patches to achieve a valid state. When a client requests the use of network resources from a network administrator, the network administrator requests the client's bill of health. If the bill of health is valid, the client is admitted to the network. If the bill of health is invalid, the client is placed in quarantine.
    Type: Grant
    Filed: April 14, 2004
    Date of Patent: May 12, 2009
    Assignee: Microsoft Corporation
    Inventors: Elliot D. Lewis, Hakan Berk, Narendra C. Gidwani, Jesper M. Johansson, Timothy M. Moore, Ashwin Palekar, Calvin C. Choe