Patents by Inventor Fred Hewitt Smith

Fred Hewitt Smith has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10185816
    Abstract: Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from equipment of a user, wherein the image includes an indication of an individual and an indication of a local environment. The individual is identified within the image to obtain an identification of the individual, and the local environment is determined as a predetermined local environment based on the identification of the local environment. Access to a restricted computing resource is facilitated based on the determining that the individual is the user and that the local environment is the predetermined local environment. Other embodiments are disclosed.
    Type: Grant
    Filed: July 11, 2017
    Date of Patent: January 22, 2019
    Assignee: Angel Secure Networks, Inc.
    Inventor: Fred Hewitt Smith
  • Publication number: 20170363767
    Abstract: A container includes multiple panels defining an interior volume, with a first panel including a composite material. A first beam detector element positioned within the interior volume detects a directed radiation scan beam that includes a modulated query message. Also positioned within the interior volume are a security element to detect an intrusion and an identification element communicatively coupled to the first beam detector element to store an identity of the container and to produce a query response message without breaking a seal of the container. A transmitter element is coupled to the identification element to transmit a response message to a receiver unit. The beam enters the inter volume along a path directed through the first panel, across a portion of the interior volume and onto the first beam detector element allowing for determination of a material property of contents of the interior volume.
    Type: Application
    Filed: August 11, 2014
    Publication date: December 21, 2017
    Inventor: Fred Hewitt Smith
  • Publication number: 20170324739
    Abstract: A system that incorporates the subject disclosure may perform, for example, operations including obtaining a request from a mobile device to allow user access to restricted content of a separate device. The process further includes forwarding a token to the separate device by way of a second wireless network, to obtain a separate device token, and forwarding the token to the first device by way of the first network to obtain a mobile device token, wherein the mobile device token is forwarded to the separate device by way of a third network. A confirmation that the token was obtained at the separate device is based on the result of the comparison indicating a match between the mobile device token and the separate device token. Access to the restricted content of the separate device is authorized based on to the confirmation. Other embodiments are disclosed.
    Type: Application
    Filed: July 25, 2017
    Publication date: November 9, 2017
    Inventors: Fred Hewitt SMITH, Cynthia SMITH
  • Publication number: 20170316196
    Abstract: Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from equipment of a user, wherein the image includes an indication of an individual and an indication of a local environment. The individual is identified within the image to obtain an identification of the individual, and the local environment is determined as a predetermined local environment based on the identification of the local environment. Access to a restricted computing resource is facilitated based on the determining that the individual is the user and that the local environment is the predetermined local environment. Other embodiments are disclosed.
    Type: Application
    Filed: July 11, 2017
    Publication date: November 2, 2017
    Inventor: Fred Hewitt Smith
  • Patent number: 9742771
    Abstract: A system that incorporates the subject disclosure may perform, for example, operations including receiving a request from a first device to access information content of a second device. The process further includes forwarding a token to the second device by way of a second wireless network, to obtain a second device token, and forwarding the token to the first device by way of the first network to obtain a first device token, wherein the first device forwards the first device token to the second device by way of a third network. A confirmation that the token was received at the first device is based on the result of the comparison indicating a match between the first device token and the second device token. Access to the information content of the second device is authorized in response to the confirmation. Other embodiments are disclosed.
    Type: Grant
    Filed: January 25, 2016
    Date of Patent: August 22, 2017
    Assignee: Angel Secure Networks, Inc.
    Inventors: Fred Hewitt Smith, Cynthia Smith
  • Patent number: 9740846
    Abstract: Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.
    Type: Grant
    Filed: May 25, 2015
    Date of Patent: August 22, 2017
    Assignee: ANGEL SECURE NETWORKS, INC.
    Inventor: Fred Hewitt Smith
  • Publication number: 20170099315
    Abstract: A server uses an encryption key to decrypt authentication information thereby facilitating communication with network-accessible applications that may be remotely located from the server. Servers can also use encryption keys to decrypt files containing sensitive data. The encryption key is obtained by a collection of software agents, each providing a portion of information necessary for generating the encryption key. Each software agent performs a respective examination, the results of which determine whether the respective portion of information is valid or not. A complete encryption key can be obtained only when all of the contributing portions of information are valid.
    Type: Application
    Filed: June 14, 2016
    Publication date: April 6, 2017
    Inventors: BENJAMIN SMITH, DANIEL SABIN, FRED HEWITT SMITH
  • Publication number: 20160363687
    Abstract: A container includes multiple panels defining an interior volume, with a first panel including a composite material. A first beam detector element positioned within the interior volume detects a directed radiation scan beam that includes a modulated query message. Also positioned within the interior volume are a security element to detect an intrusion and an identification element communicatively coupled to the first beam detector element to store an identity of the container and to produce a query response message without breaking a seal of the container. A transmitter element is coupled to the identification element to transmit a response message to a receiver unit. The beam enters the inter volume along a path directed through the first panel, across a portion of the interior volume and onto the first beam detector element allowing for determination of a material property of contents of the interior volume.
    Type: Application
    Filed: August 11, 2014
    Publication date: December 15, 2016
    Inventor: Fred Hewitt Smith
  • Publication number: 20160255058
    Abstract: A system that incorporates teachings of the subject disclosure may include, for example, determining examination results based on sensory information obtained from sensors operating in a deployed environment, wherein the sensory information includes a combination of more than one of temperature, position, motion, and mission status. Software agents conduct reviews of examination results based on sensory ranges. Encryption key fragments are generated in response to the reviews of the examination results. The encryption key fragments are combined, to obtain a cryptographic session key. A clear-text version of encrypted sensitive information is obtained via the cryptographic session key responsive to the examination results falling within the sensory ranges. Decryption of the encrypted sensitive information is prevented responsive at least one of the examination results falling outside the sensory ranges. Other embodiments are disclosed.
    Type: Application
    Filed: May 9, 2016
    Publication date: September 1, 2016
    Inventors: Fred Hewitt Smith, Cynthia Smith, Benjamin Smith, Daniel Sabin
  • Patent number: 9390280
    Abstract: A server uses an encryption key to decrypt authentication information thereby facilitating communication with network-accessible applications that may be remotely located from the server. Servers can also use encryption keys to decrypt files containing sensitive data. The encryption key is obtained by a collection of software agents, each providing a portion of information necessary for generating the encryption key. Each software agent performs a respective examination, the results of which determine whether the respective portion of information is valid or not. A complete encryption key can be obtained only when all of the contributing portions of information are valid.
    Type: Grant
    Filed: September 16, 2013
    Date of Patent: July 12, 2016
    Assignee: Angel Secure Networks, Inc.
    Inventors: Benjamin Smith, Daniel Sabin, Fred Hewitt Smith
  • Patent number: 9355228
    Abstract: A system that incorporates teachings of the subject disclosure may include, for example, receiving multiple software agents and configuring a network of the multiple software agents according to a predetermined policy. The process can further include facilitating secure communications among software agents of the network of the multiple software agents according to the predetermined policy. A state of one of the system, a system environment within which the system operates, or a combination thereof can be determined, based on the secure communications among the software agents of the network of the multiple software agents. A computing environment can be facilitated conditionally on the state of the one of the system, the system environment, or the combination thereof, according to the predetermined policy to support a mission application. Other embodiments are disclosed.
    Type: Grant
    Filed: July 15, 2013
    Date of Patent: May 31, 2016
    Assignee: Angel Secure Networks, Inc.
    Inventors: Fred Hewitt Smith, III, Cynthia Smith, Benjamin Smith, Daniel Sabin
  • Publication number: 20160142416
    Abstract: A system that incorporates the subject disclosure may perform, for example, operations including receiving a request from a first device to access information content of a second device. The process further includes forwarding a token to the second device by way of a second wireless network, to obtain a second device token, and forwarding the token to the first device by way of the first network to obtain a first device token, wherein the first device forwards the first device token to the second device by way of a third network. A confirmation that the token was received at the first device is based on the result of the comparison indicating a match between the first device token and the second device token. Access to the information content of the second device is authorized in response to the confirmation. Other embodiments are disclosed.
    Type: Application
    Filed: January 25, 2016
    Publication date: May 19, 2016
    Inventors: FRED HEWITT SMITH, CYNTHIA SMITH
  • Patent number: 9270660
    Abstract: A system that incorporates the subject disclosure may perform, for example, operations including receiving a request from a first device to access information content of a second device. The process further includes determining that the first device is authorized to access the information content according to authorization credentials, and determining a token associated with the request in response to determining that the first device is authorized to access the information content. The token is forwarded to the first device, and it is confirmed that the token was received at the first device. Access to the information content of the second device is authorized in response to confirming that the token was received at the first device. Other embodiments are disclosed.
    Type: Grant
    Filed: November 25, 2013
    Date of Patent: February 23, 2016
    Assignee: ANGEL SECURE NETWORKS, INC.
    Inventors: Fred Hewitt Smith, Cynthia Smith
  • Publication number: 20150278501
    Abstract: Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.
    Type: Application
    Filed: May 25, 2015
    Publication date: October 1, 2015
    Inventor: Fred Hewitt Smith
  • Patent number: 9058482
    Abstract: Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user.
    Type: Grant
    Filed: March 1, 2012
    Date of Patent: June 16, 2015
    Assignee: ANGEL SECURE NETWORKS, INC.
    Inventor: Fred Hewitt Smith
  • Patent number: 8930717
    Abstract: Described herein are devices and techniques related to implementation of a trustworthy electronic processing module. During fabrication, a manufacturer is provided with partial technical specifications that intentionally exclude at least one critical design feature. Fabrication of the electronic processing module is monitored from a trusted remote location; wherefrom, the intentionally excluded at least one critical design feature is implemented, thereby completing manufacture of the trustworthy electronic processing module. At least one of the acts of monitoring and implementing can be accomplished by instantiating executable software remotely from a trusted remote location and immediately prior to execution. It is the executable software that enables at least one of the acts of monitoring and implementing. Further, the instantiated executable software is removed or otherwise rendered inoperable immediately subsequent to execution.
    Type: Grant
    Filed: March 1, 2012
    Date of Patent: January 6, 2015
    Assignee: Angel Secure Networks, Inc.
    Inventor: Fred Hewitt Smith
  • Patent number: 8917177
    Abstract: An apparatus is disclosed including one or more security structures. The one or more security structures includes: a weldable frame; a plurality of composite panels, each panel securable to the weldable frame, each composite panel configured to form at least one joint with at least one adjoining composite panel; and a respective security element embedded within each of the composite panels. The security element is configured to detect a breach in the composite panel.
    Type: Grant
    Filed: December 11, 2012
    Date of Patent: December 23, 2014
    Assignee: Angel Secure Networks, Inc.
    Inventor: Fred Hewitt Smith
  • Patent number: 8803685
    Abstract: A method for scanning and securing a container including a plurality of at least partially composite panels defining an interior volume is disclosed. The method includes: storing unique identification information in an identification element within container; sealing the container; monitoring the container for intrusion; without breaching the seal of the container, remotely identifying the container based on the unique identity information without breaching the seal of the container; without breaching the seal of the container; scanning the identified container to determine the presence or absence of a nuclear weapon in the interior volume; and if the scan determines no nuclear weapon is present remotely storing certificate information associated with the identity of the container in a remote monitor unit.
    Type: Grant
    Filed: February 1, 2008
    Date of Patent: August 12, 2014
    Assignee: Angel Secure Networks, Inc.
    Inventor: Fred Hewitt Smith
  • Publication number: 20140157392
    Abstract: A system that incorporates the subject disclosure may perform, for example, operations including receiving a request from a first device to access information content of a second device. The process further includes determining that the first device is authorized to access the information content according to authorization credentials, and determining a token associated with the request in response to determining that the first device is authorized to access the information content. The token is forwarded to the first device, and it is confirmed that the token was received at the first device. Access to the information content of the second device is authorized in response to confirming that the token was received at the first device. Other embodiments are disclosed.
    Type: Application
    Filed: November 25, 2013
    Publication date: June 5, 2014
    Applicant: ANGEL SECURE NETWORKS, INC.
    Inventors: Fred Hewitt Smith, Cynthia Smith
  • Publication number: 20140082354
    Abstract: A server uses an encryption key to decrypt authentication information thereby facilitating communication with network-accessible applications that may be remotely located from the server. Servers can also use encryption keys to decrypt files containing sensitive data. The encryption key is obtained by a collection of software agents, each providing a portion of information necessary for generating the encryption key. Each software agent performs a respective examination, the results of which determine whether the respective portion of information is valid or not. A complete encryption key can be obtained only when all of the contributing portions of information are valid.
    Type: Application
    Filed: September 16, 2013
    Publication date: March 20, 2014
    Applicant: Angel Secure Networks, Inc.
    Inventors: Benjamin Smith, Daniel Sabin, Fred Hewitt Smith