Patents by Inventor Jeff S. Demoff

Jeff S. Demoff has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20040205578
    Abstract: A system and method for converting a document to create a reusable learning object is disclosed. The reusable learning object is used to create a course of instruction for an online or virtual classroom. The reusable learning object is shared and modified by different users for each course. A document stored on a computing platform coupled to the system is made available for the reusable learning object. The document is created by an application and contains data that may not be in a format useable by the reusable learning object. An autopilot and an export filter are invoked by a prompt or command from the application or another source. The export filter converts the data within the document into metadata to support an extensible markup language (“XML”) format. The autopilot queries and receives information on the document to create the reusable learning object. The reusable learning object is created by the converted data and received information.
    Type: Application
    Filed: April 25, 2002
    Publication date: October 14, 2004
    Inventors: Alan S. Wolff, Carol Harrisville-Wolff, Jeff S. Demoff
  • Publication number: 20040030887
    Abstract: A method for secure network communications. The method includes receiving at the service provider a request from a client that includes an identifier (e.g., a digital certificate) for the client. The identity is authenticated by the service provider by retrieving a stored copy of a digital certificate for the client sending the request and comparing the copy of the digital certificate included with the request to the stored copy. If authenticated, access to the service provider is granted and typically, a response is generated and transmitted to the client that includes an identifier or a digital certificate for the service provider. The client then authenticates the service provider by comparing the certificate with a stored copy prior to transmitting further messages. The method includes encrypting and decrypting the requests and the responses using private and public key pairs associated with the stored digital certificates.
    Type: Application
    Filed: August 7, 2002
    Publication date: February 12, 2004
    Inventors: Carol L. Harrisville-Wolff, Jeff S. Demoff, Alan S. Wolff
  • Publication number: 20030220960
    Abstract: A system and method for processing data over a distributed network is disclosed. The distributed network includes a plurality of nodes and a central machine coupled to the nodes. The central machine receives a data space and partitions the data space into data blocks. The data blocks are sent to the nodes. Each node analyzes a received data block using an optimization algorithm forwarded by the central machine. Results that may be of interest to other data blocks are detected during the analysis and forwarded from the nodes to the central machine at an interval. The central machine forwards the results to the other nodes within the distributed network in order to update their processing of the data blocks. The updating activity continues until the data blocks have been processed.
    Type: Application
    Filed: May 21, 2002
    Publication date: November 27, 2003
    Inventors: Jeff S. Demoff, Carol Harrisville-Wolff, Alan S. Wolff
  • Publication number: 20030196148
    Abstract: A system and method for monitoring within a peer-to-peer network is disclosed. A peer-to-peer network includes peer machines coupled together without the use of a central processor. Each peer machine is able to monitor the other peer machines within the network and to perform failure recovery operations in the event a peer machine fails. A ping command is sent to every peer machine within the network using a peer protocol on the peer machine. If a response is received at the sending peer machine, then the responding peer machine is operating. If no response is received, a failure may have occurred and the sending peer machine can take corrective action, such alerting a system administrator or restarting the failed machine. The use of the peer monitoring reduces the need for central monitoring and prevents the network from having a single point of failure for monitoring activities.
    Type: Application
    Filed: April 12, 2002
    Publication date: October 16, 2003
    Inventors: Carol Harrisville-Wolff, Jeff S. Demoff, Alan S. Wolff
  • Publication number: 20030188153
    Abstract: A system and method for mirroring data using a server is disclosed. The system is a network having a plurality of client systems coupled to the server, known as a storage management server. The storage management server has a distributor module that executes against a data structure stored on the server. The distributor module randomly partitions the data structure into data fragments. A set of memory locations are allocated on the client systems. A memory location is unused memory on the client system. The distributor module stores the randomly partitioned data structures at the memory locations. The data fragments can be encrypted before storage for additional security. The locations of the data fragments and any encryption keys are stored on the storage management server such that the data structure can be reconstructed by the data fragments when requested. The system also includes a backup server to store the locations and encryption keys to reconstruct the data structure, if desired.
    Type: Application
    Filed: April 2, 2002
    Publication date: October 2, 2003
    Inventors: Jeff S. Demoff, Carol Harrisville-Wolff, Alan S. Wolff
  • Publication number: 20030004879
    Abstract: A method and system are provided for issuing credit as payment in a consumer transaction which eliminates the need for a traditional credit card while also minimizing any potential for fraud or theft. The present invention responds to a request for issuing a credit transaction number that is made concurrent with a particular transaction. The credit transaction number is then randomly generated and made valid only for the requested transaction, and automatically ages a short period of time after the request. The credit transaction numbers are continually recycled for subsequent requests irrespective of the customer identity. The request can be made from a mobile communication device such as PCS telephone, or from a personal computer using an electronic commerce program.
    Type: Application
    Filed: August 22, 2002
    Publication date: January 2, 2003
    Applicant: Qwest Communications International Inc.
    Inventors: Jeff S. Demoff, Brad Reeves, Alan Scott Wolff
  • Patent number: 6456984
    Abstract: A method and system are provided for issuing credit as payment in a consumer transaction which eliminates the need for a traditional credit card while also minimizing any potential for fraud or theft. The present invention responds to a request for issuing a credit transaction number that is made concurrent with a particular transaction. The credit transaction number is then randomly generated and made valid only for the requested transaction, and automatically ages a short period of time after the request. The credit transaction numbers are continually recycled for subsequent requests irrespective of the customer identity. The request can be made from a mobile communication device such as PCS telephone, or from a personal computer using an electronic commerce program.
    Type: Grant
    Filed: May 28, 1999
    Date of Patent: September 24, 2002
    Assignee: Qwest Communications International Inc.
    Inventors: Jeff S. Demoff, Brad Reeves, Alan Scott Wolff