Patents by Inventor Gary William Streuter

Gary William Streuter has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230222198
    Abstract: A system and method for confirming the identity of a user seeking access to a protected account or physical place by using the sequenced selection of one or more colors from one or more panels and/or palettes of color that are presented visually to the user seeking access. An identification key is built based on the hidden unique identifiers assigned for each said color selected by the user and the sequence in which the colors were selected by the user. Each color displayed has an assigned unique identifier that is not visible to the user seeking access but is used by a first software programing operating on the uses device to assemble the identification key required to gain account access.
    Type: Application
    Filed: January 8, 2023
    Publication date: July 13, 2023
    Inventors: Gary William Streuter, William Pat Price
  • Publication number: 20220309148
    Abstract: A Personal Launch Code (PLC) known only by the rightful account owner becomes an included element within the construction of an Anonymous Access Key (AAK) used to validate and authenticate digital account access and whereby said PLC is never stored for matching against another representation of said PLC.
    Type: Application
    Filed: March 27, 2022
    Publication date: September 29, 2022
    Inventors: Gary William Streuter, William Pat Price
  • Publication number: 20220295280
    Abstract: An external Secure Intelligent Secondary Router is connected to a Primary Wired/Wireless Router/Modem via wire cable, and whereby said external Secure Intelligent Secondary Router communicably coupled to said Primary Wired/Wireless Router/Modem creates one or more secure secondary Wi-Fi networks that can only be accessed by a computing device that has been registered by the rightful account owner and whose identity has been validated by an online validation service.
    Type: Application
    Filed: March 7, 2022
    Publication date: September 15, 2022
    Inventors: Gary William Streuter, William Pat Price, Andy Gutman
  • Publication number: 20220272605
    Abstract: An external Secure Intelligent Wireless Router is wirelessly connected to a Primary Wireless Router/Modem, and whereby said external Secure Intelligent Wireless Router creates one or more secure secondary Wi-Fi networks that can only be accessed by a computing device that has been registered by the rightful account owner and whose identity has been validated by an online validation service.
    Type: Application
    Filed: February 22, 2022
    Publication date: August 25, 2022
    Inventors: Gary William Streuter, William Pat Price, Andy Gutman
  • Publication number: 20210295327
    Abstract: This invention discloses a system and methods for defeating a so-called man-in-the-middle (MITM) attack. An electronic instruction to collect specified distinctive identifiers from a local/mobile computing device seeking access to a first network website, is generated by said first network website and that electronic instruction is assigned a unique onetime identification token. Said electronic instruction with said unique onetime identification token is transmitted by said first network website to said local/mobile computing device. Said unique onetime identification token is also maintained in a database of unique onetime identification tokens resident on said first network website. In addition, said unique onetime identification token is sent to a secondary network website, where it is also stored in a database of unique onetime identification tokens. Said unique onetime identification token may also contain a time expiration value which defines the validity period for said unique transaction identifier.
    Type: Application
    Filed: June 10, 2021
    Publication date: September 23, 2021
    Inventors: Gary William Streuter, William Pat Price
  • Publication number: 20210064737
    Abstract: The present invention describes the creation and use of a hybrid password used to gain access to a password protected online website. The hybrid password is a method whereby an online website, acting as a portal for access to password-protected websites, programmatically generates and stores a base password in the online website portal. A base password is then combined with a secondary password or PIN that is generated by the account owner and known only to the account owner. Together the base password and account owner's PIN form the hybrid password, and becomes the complete password required to provide access to said password protected website. The account owner's password or PIN is not stored in the online website portal and is known only to said account owner.
    Type: Application
    Filed: August 25, 2020
    Publication date: March 4, 2021
    Inventors: Gary William Streuter, William Pat Price
  • Publication number: 20200402046
    Abstract: This invention discloses a system and methods for defeating a so-called man-in-the-middle (MITM) attack. An electronic instruction to collect specified distinctive identifiers from a local/mobile computing device seeking access to a first network website, is generated by said first network website and that electronic instruction is assigned a unique onetime identification token. Said electronic instruction with said unique onetime identification token is transmitted by said first network website to said local/mobile computing device. Said unique onetime identification token is also maintained in a database of unique onetime identification tokens resident on said first network website. In addition, said unique onetime identification token is sent to a secondary network website, where it is also stored in a database of unique onetime identification tokens. Said unique onetime identification token may also contain a time expiration value which defines the validity period for said unique transaction identifier.
    Type: Application
    Filed: January 2, 2018
    Publication date: December 24, 2020
    Inventors: Gary William Streuter, William Pat Price
  • Patent number: 9691067
    Abstract: The present invention consists of methods whereby local/mobile computing devices are registered by collecting a set of hardware and/or software distinctive identifiers to be saved in a validation database residing on a validation database server/Web server, such that the local/mobile computing device can be used as a digital hardware key for right of access and authorization of electronic transactions. This is done by comparing a regenerated set of hardware and/or software distinctive identifiers with those previously registered in the validation database in order to validate the identity of the local/mobile computing device. The invention consists of a first software program executing on a local/mobile computing device that generates the set of hashed and/or encrypted hardware and/or software distinctive identifiers and a second software program resident residing on a validation database server/Web server that manages the validation database.
    Type: Grant
    Filed: May 20, 2015
    Date of Patent: June 27, 2017
    Assignee: Invysta Technology Group
    Inventors: Gary William Streuter, William Pat Price
  • Publication number: 20160283940
    Abstract: The present invention consists of methods whereby local/mobile computing devices are registered by collecting a set of hardware and/or software distinctive identifiers to be saved in a validation database residing on a validation database server/Web server, such that the local/mobile computing device can be used as a digital hardware key for right of access and authorization of electronic transactions. This is done by comparing a regenerated set of hardware and/or software distinctive identifiers with those previously registered in the validation database in order to validate the identity of the local/mobile computing device. The invention consists of a first software program executing on a local/mobile computing device that generates the set of hashed and/or encrypted hardware and/or software distinctive identifiers and a second software program resident residing on a validation database server/Web server that manages the validation database.
    Type: Application
    Filed: March 28, 2016
    Publication date: September 29, 2016
    Inventors: Gary William Streuter, William Pat Price
  • Publication number: 20160283938
    Abstract: The present invention consists of methods whereby local/mobile computing devices are registered by collecting a set of hardware and/or software distinctive identifiers to be saved in a validation database residing on a validation database server/Web server, such that the local/mobile computing device can be used as a digital hardware key for right of access and authorization of electronic transactions. This is done by comparing a regenerated set of hardware and/or software distinctive identifiers with those previously registered in the validation database in order to validate the identity of the local/mobile computing device. The invention consists of a first software program executing on a local/mobile computing device that generates the set of hashed and/or encrypted hardware and/or software distinctive identifiers and a second software program resident residing on a validation database server/Web server that manages the validation database.
    Type: Application
    Filed: March 28, 2016
    Publication date: September 29, 2016
    Inventors: Gary William Streuter, William Pat Price
  • Publication number: 20160277412
    Abstract: The present invention consists of methods whereby local/mobile computing devices are registered by collecting a set of hardware and/or software distinctive identifiers to be saved in a validation database residing on a validation database server/Web server, such that the local/mobile computing device can be used as a digital hardware key for right of access and authorization of electronic transactions. This is done by comparing a regenerated set of hardware and/or software distinctive identifiers with those previously registered in the validation database in order to validate the identity of the local/mobile computing device. The invention consists of a first software program executing on a local/mobile computing device that generates the set of hashed and/or encrypted hardware and/or software distinctive identifiers and a second software program resident residing on a validation database server/Web server that manages the validation database.
    Type: Application
    Filed: April 22, 2015
    Publication date: September 22, 2016
    Inventors: Gary William Streuter, William Pat Price
  • Publication number: 20160277382
    Abstract: The present invention consists of methods whereby local/mobile computing devices are registered by collecting a set of hardware and/or software distinctive identifiers to be saved in a validation database residing on a validation database server/Web server, such that the local/mobile computing device can be used as a digital hardware key for right of access and authorization of electronic transactions. This is done by comparing a regenerated set of hardware and/or software distinctive identifiers with those previously registered in the validation database in order to validate the identity of the local/mobile computing device. The invention consists of a first software program executing on a local/mobile computing device that generates the set of hashed and/or encrypted hardware and/or software distinctive identifiers and a second software program resident residing on a validation database server/Web server that manages the validation database.
    Type: Application
    Filed: May 20, 2015
    Publication date: September 22, 2016
    Inventors: Gary William Streuter, William Pat Price
  • Publication number: 20140129785
    Abstract: Secure erase of files and unallocated sectors on storage media such that any previous data is non-recoverable. The database contains sets of data patterns used to overwrite the data on different physical media. The software programs manage the overwriting process automatically when a file has been deleted. When de-allocated sectors in the file system are pruned from a file or escaped the file deletion process also finds them. Data will never be found on deleted sectors or on pruned sectors is overwritten.
    Type: Application
    Filed: January 6, 2014
    Publication date: May 8, 2014
    Applicant: CMS PRODUCTS INC.
    Inventors: Randell Deetz, Gary William Streuter, Kenneth Burke, James Sedin
  • Patent number: 8627020
    Abstract: Secure erase of files and unallocated sectors on storage media such that any previous data is non-recoverable. The database contains sets of data patterns used to overwrite the data on different physical media. The software programs manage the overwriting process automatically when a file has been deleted. When de-allocated sectors in the file system are pruned from a file or escaped the file deletion process also finds them. Data will never be found on deleted sectors or on pruned sectors is overwritten.
    Type: Grant
    Filed: July 31, 2012
    Date of Patent: January 7, 2014
    Assignee: CMS Products, Inc.
    Inventors: Randell Deetz, Gary William Streuter, Kenneth Burke, James Sedin
  • Patent number: 8549273
    Abstract: A backup system on an external bootable personal computer drive that presents a unique and specific wall paper display on the computer monitor when the operating system residing on the drive is booted when the drive is externally attached to the computer system. The invention is used to make it obvious to the user that the original system drive has been replaced by a cloned or imaged drive. The invention consists of a software program and a graphics file. The software program recognizes the case where the drive it resides on has been booted over an external bus and when that event occurs the software program substitutes a specific graphic file for the normal wall paper file used to display the background on the computer display.
    Type: Grant
    Filed: March 24, 2010
    Date of Patent: October 1, 2013
    Assignee: CMS Products, Inc.
    Inventors: Randell Deetz, Gary William Streuter, Kenneth Burke, James Sedin
  • Publication number: 20130086217
    Abstract: Desktop and portable computers to backup their data can backup their storage device over a wireless link where the storage device and the computer are always communicating whenever the link is established. Unlike existing technologies that provide wireless access between computers and storage devices the present invention does not require the storage device to be aware of operating systems or file system. All intelligence for file system access and how the data is archived resides with the desktop or portable computer.
    Type: Application
    Filed: November 27, 2012
    Publication date: April 4, 2013
    Applicant: CMS PRODUCTS INC
    Inventors: William Pat Price, Gary WIlliam Streuter, James Siden, Ken Burke, Randy Dietz
  • Publication number: 20120300331
    Abstract: Secure erase of files and unallocated sectors on storage media such that any previous data is non-recoverable. The database contains sets of data patterns used to overwrite the data on different physical media. The software programs manage the overwriting process automatically when a file has been deleted. When de-allocated sectors in the file system are pruned from a file or escaped the file deletion process also finds them. Data will never be found on deleted sectors or on pruned sectors is overwritten.
    Type: Application
    Filed: July 31, 2012
    Publication date: November 29, 2012
    Applicant: CMS PRODUCTS INC.
    Inventors: Randell Deetz, Gary William Streuter, Kenneth Burke, James Sedin
  • Patent number: 8234462
    Abstract: Secure erase of files and unallocated sectors on storage media such that any previous data is non-recoverable. The database contains sets of data patterns used to overwrite the data on different physical media. The software programs manage the overwriting process automatically when a file has been deleted. When de-allocated sectors in the file system are pruned from a file or escaped the file deletion process also finds them. Data will never be found on deleted sectors or on pruned sectors is overwritten.
    Type: Grant
    Filed: September 19, 2011
    Date of Patent: July 31, 2012
    Assignee: CMS Products, Inc.
    Inventors: Randell Deetz, Gary William Streuter, Kenneth Burke, James Siden
  • Publication number: 20120072398
    Abstract: Backup applications that use externally connected hard disk drives for storing full image backups of a windows system disk or compressed image or file by file backups of a windows system disk. A system incrementally updates the images, including the system registry, and puts information on the external drive that makes it bootable.
    Type: Application
    Filed: September 23, 2011
    Publication date: March 22, 2012
    Applicant: CMS PRODUCTS, INC.
    Inventors: Gary William Streuter, Randy Deetz, James Sedin
  • Publication number: 20120030183
    Abstract: Secure erase of files and unallocated sectors on storage media such that any previous data is non-recoverable. The database contains sets of data patterns used to overwrite the data on different physical media. The software programs manage the overwriting process automatically when a file has been deleted. When de-allocated sectors in the file system are pruned from a file or escaped the file deletion process also finds them. Data will never be found on deleted sectors or on pruned sectors is overwritten.
    Type: Application
    Filed: September 19, 2011
    Publication date: February 2, 2012
    Applicant: CMS PRODUCTS INC
    Inventors: Randell Deetz, Gary William Streuter, Kenneth Burke, James Sedin