Patents by Inventor H. Stan Johnson

H. Stan Johnson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9436815
    Abstract: A block management unification system and method for communicating a data file that includes a source component, a first rearrangement criterion, a first block encryption key, a second rearrangement criterion, a second block encryption key, a compression module, and an encryption module. The source component accesses the data file that is divided into a plurality of blocks. The first rearrangement criterion organize the blocks according to the first rearrangement criterion. The first block encryption key is inserted into the blocks. The second rearrangement criterion organize the blocks according to the second rearrangement criterion. The second block encryption key is inserted into the blocks. A compression module compresses the rearranged blocks. An encryption module encrypts the rearranged blocks with the first block encryption key and the second block encryption key.
    Type: Grant
    Filed: July 12, 2013
    Date of Patent: September 6, 2016
    Assignee: XSETTE TECHNOLOGY, INC.
    Inventors: Albert Carlson, Steven B. Cohen, Lawrence duBoef, H. Stan Johnson
  • Patent number: 8924730
    Abstract: A system and method for embedding a watermark into a data file and communicating the data file to a particular node from a source component is described. The system includes a particular node, a source component, a node identifier request, a query, a watermark, a permutation key, an encrypted data file, and a node decryption key. The node identifier request is communicated from the source component to the particular node. The watermark is then embedded into the data file by the source component. The permutation key is configured to permute the watermark and the permutation key is changed so the location of the watermark changes. The encrypted data is decrypted at the particular node with the node decryption key that corresponds to the particular node. The particular node recovers the watermark from the data file with the permutation key.
    Type: Grant
    Filed: July 12, 2013
    Date of Patent: December 30, 2014
    Assignee: Xsette Technology, Inc.
    Inventors: Albert Carlson, Steven B. Cohen, Lawrence duBoef, H. Stan Johnson
  • Publication number: 20140325233
    Abstract: A system and method for embedding a watermark into a data file and communicating the data file to a particular node from a source component is described. The system includes a particular node, a source component, a node identifier request, a query, a watermark, a permutation key, an encrypted data file, and a node decryption key. The node identifier request is communicated from the source component to the particular node. The watermark is then embedded into the data file by the source component. The permutation key is configured to permute the watermark and the permutation key is changed so the location of the watermark changes. The encrypted data is decrypted at the particular node with the node decryption key that corresponds to the particular node. The particular node recovers the watermark from the data file with the permutation key.
    Type: Application
    Filed: July 12, 2013
    Publication date: October 30, 2014
    Applicant: XSETTE TECHNOLOGY, INC.
    Inventors: Albert Carlson, Steven B. Cohen, Lawrence duBoef, H. Stan Johnson
  • Publication number: 20140325205
    Abstract: A system and method for communicating a data file is described. The system includes at least one particular node, a source component, a node identifier request, a query, an encrypted data file and a node decryption key. The node identifier request is communicated from the source component to the particular node. The unique node identifier is communicated from the particular node to the source component. The encrypted data file is generated by the source component. The encrypted data file is produced with an encryption algorithm that utilizes the unique node identifier to generate an encryption key. The node decryption key for the node device is also generated by the source component utilizing the unique node identifier. The encrypted data file is then communicated from the source component to the particular node. The encrypted data is decrypted at the node with the node decryption key that corresponds to the particular node.
    Type: Application
    Filed: July 12, 2013
    Publication date: October 30, 2014
    Applicant: XSETTE TECHNOLOGY, INC.
    Inventors: Albert Carlson, Steven B. Cohen, Lawrence duBoef, H. Stan Johnson
  • Publication number: 20140325213
    Abstract: A block management unification system and method for communicating a data file that includes a source component, a first rearrangement criterion, a first block encryption key, a second rearrangement criterion, a second block encryption key, a compression module, and an encryption module. The source component accesses the data file that is divided into a plurality of blocks. The first rearrangement criterion organize the blocks according to the first rearrangement criterion. The first block encryption key is inserted into the blocks. The second rearrangement criterion organize the blocks according to the second rearrangement criterion. The second block encryption key is inserted into the blocks. A compression module compresses the rearranged blocks. An encryption module encrypts the rearranged blocks with the first block encryption key and the second block encryption key.
    Type: Application
    Filed: July 12, 2013
    Publication date: October 30, 2014
    Applicant: XSETTE TECHNOLOGY, INC.
    Inventors: Albert Carlson, Steven B. Cohen, Lawrence duBoef, H. Stan Johnson