Patents by Inventor Jennifer Marie Catanduanes McEwen

Jennifer Marie Catanduanes McEwen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11165825
    Abstract: System and method for extending zones of control through a hotspot for communications to and from computing devices based on specific criteria corresponding to zones of control. An encrypted virtual private network (VPN) for a browsing session may be established at a first computing device and remote server computers matching the parameters of the established zone. Then, a user of the first computing device may further establish a wireless hotspot network suited to allow additional remote computing devices to piggy-back on the one or more established encrypted virtual private networks. Thus, other connected devices using the hotspot connection to reach a broader computer network (e.g., the Internet) are then also taking advantage of the encrypted VPN being provided by the host of the hotspot. Each connected computing device may then also have various communications isolated through zonal control from the hotspot device.
    Type: Grant
    Filed: February 16, 2018
    Date of Patent: November 2, 2021
    Assignee: Emerald Cactus Ventures, Inc.
    Inventors: Jesse Aaron Adams, Christopher Joseph O'Connell, Jennifer Marie Catanduanes McEwen
  • Patent number: 11165751
    Abstract: System and method for establishing simultaneous zones of control for various communications to and from a computing devices based on specific criteria corresponding to more than one zone of control encompassing similarly-situated network locations. A browser (or any other common term for a networked computing session GUI) executing on a computing device may establish several zones of restricted data interaction based on specific user-defined criteria, thereby establishing simultaneous zones that respectively correspond to one or more specific parameters with regard to networked computer interactions. For example, a first zone may be associated with only other computers located in the United States (as determined by DNS records and the like) and a second zone may be associated with only other computers located with a specific domain (e.g., www.mybusiness.com).
    Type: Grant
    Filed: February 16, 2018
    Date of Patent: November 2, 2021
    Assignee: Emerald Cactus Ventures, Inc.
    Inventors: Jesse Aaron Adams, Christopher Joseph O'Connell, Jennifer Marie Catanduanes McEwen
  • Patent number: 11122013
    Abstract: A system and method for establishing zones of control for communications among computing devices. Zones of control refer to the concept of unique user-controlled silos separating the interactions between computer devices over the network. When the user of a device connects to a networked computing environment of any kind, at least some data may be sent from the user's device onto the network, as well as downloaded to the user's device. These “data interactions” are usually frequent and numerous. With a private encrypted browsing session established, communications within an established zone of control may be isolated from all other communications and vice versa.
    Type: Grant
    Filed: January 9, 2018
    Date of Patent: September 14, 2021
    Assignee: Emerald Cactus Ventures, Inc.
    Inventors: Jesse Aaron Adams, Christopher Joseph O'Connell, Jennifer Marie Catanduanes McEwen
  • Publication number: 20180234396
    Abstract: System and method for establishing zones of restricted data interaction based on specific user-defined parameters. In an embodiment, a first zone may be established having user-selected parameters for a first type of network traffic such as traffic associated with only other computers located in the United States (as determined by DNS records and the like) and a second zone may be established having user-selected parameters for a second type of network traffic such as network traffic associated with only other computers located with a specific domain (e.g., www.mybusiness.com). In such an established and zoned interaction environment, data that is free to be shared in one zone will not be free to be shared in any other zone. Thus, one may establish a virtual private network (VPN) using encrypted communications for a work session with specific user-selected parameters in establishing various zones of control.
    Type: Application
    Filed: February 16, 2018
    Publication date: August 16, 2018
    Inventors: Jesse Aaron Adams, Christopher Joseph O'Connell, Jennifer Marie Catanduanes McEwen
  • Publication number: 20180234394
    Abstract: A system and method for establishing zones of control for communications among computing devices. Zones of control refer to the concept of unique user-controlled silos separating the interactions between computer devices over the network. When the user of a device connects to a networked computing environment of any kind, at least some data may be sent from the user's device onto the network, as well as downloaded to the user's device. These “data interactions” are usually frequent and numerous. With a private encrypted browsing session established, communications within an established zone of control may be isolated from all other communications and vice versa.
    Type: Application
    Filed: January 9, 2018
    Publication date: August 16, 2018
    Inventors: Jesse Aaron Adams, Christopher Joseph O'Connell, Jennifer Marie Catanduanes McEwen
  • Publication number: 20180234456
    Abstract: System and method for extending zones of control through a hotspot for communications to and from computing devices based on specific criteria corresponding to zones of control. An encrypted virtual private network (VPN) for a browsing session may be established at a first computing device and remote server computers matching the parameters of the established zone. Then, a user of the first computing device may further establish a wireless hotspot network suited to allow additional remote computing devices to piggy-back on the one or more established encrypted virtual private networks. Thus, other connected devices using the hotspot connection to reach a broader computer network (e.g., the Internet) are then also taking advantage of the encrypted VPN being provided by the host of the hotspot. Each connected computing device may then also have various communications isolated through zonal control from the hotspot device.
    Type: Application
    Filed: February 16, 2018
    Publication date: August 16, 2018
    Inventors: Jesse Aaron Adams, Christopher Joseph O'Connell, Jennifer Marie Catanduanes McEwen