Patents by Inventor George O. Dotterer, III

George O. Dotterer, III has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160269445
    Abstract: Technologies are presented that provide cloud-based network security and access control in a networked computing system. A method may include: receiving a network traffic request from a user device, identifying the user device, applying rules specific to the network traffic request and the user device, obtaining data specific to the network traffic request in accordance with the applied rules, and providing the data to the user device for presentation to a user in accordance with the applied rules. Applying rules may include blocking, capturing, processing, redirecting, reporting on, and/or alerting to, network traffic related to the user device. The method may also include monitoring network traffic to and from the user device, and generating reports regarding the monitored network traffic. The method may further include detecting a rule violation, and providing a rule violation alert regarding the rule violation to one or more designated alert recipient devices.
    Type: Application
    Filed: May 19, 2016
    Publication date: September 15, 2016
    Applicant: Verite Group, Inc.
    Inventors: George O. Dotterer, III, David A. Hedges, Scott T. Kelly, David G. Maschinsky, Nathan H. Robinson
  • Publication number: 20150256545
    Abstract: Technologies are presented that provide cloud-based network security and access control in a networked computing system. A method may include: receiving a network traffic request from a user device, identifying the user device, applying rules specific to the network traffic request and the user device, obtaining data specific to the network traffic request in accordance with the applied rules, and providing the data to the user device for presentation to a user in accordance with the applied rules. Applying rules may include blocking, capturing, processing, redirecting, reporting on, and/or alerting to, network traffic related to the user device. The method may also include monitoring network traffic to and from the user device, and generating reports regarding the monitored network traffic. The method may further include detecting a rule violation, and providing a rule violation alert regarding the rule violation to one or more designated alert recipient devices.
    Type: Application
    Filed: March 6, 2015
    Publication date: September 10, 2015
    Inventors: George O. Dotterer, III, David A. Hedges, Scott T. Kelly, David G. Maschinsky, Nathan H. Robinson