Patents by Inventor John A. Painter

John A. Painter has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8370646
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Grant
    Filed: September 25, 2009
    Date of Patent: February 5, 2013
    Assignee: xSides Corporation
    Inventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
  • Publication number: 20120237029
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” and “replace and restore.
    Type: Application
    Filed: May 1, 2012
    Publication date: September 20, 2012
    Inventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
  • Publication number: 20100077360
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Application
    Filed: September 25, 2009
    Publication date: March 25, 2010
    Inventors: D. DAVID NASON, CARSON KAAN, JOHN E. EASTON, JASON M. SMITH, JOHN A. PAINTER, WILLIAM J. HEATON
  • Publication number: 20100077231
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Application
    Filed: September 25, 2009
    Publication date: March 25, 2010
    Inventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
  • Publication number: 20090254965
    Abstract: Methods and systems for enhancing the storage and display of video data and other digital content in a set-top box or other television environment so that such data is securely stored and displayed are provided. Example embodiments provide an enhanced display controller (EDC) that executes in an electronic device, such as a set-top box, to provide secure storage and playback of streamed digital content. The EDC creates or identifies a secure storage location and stores the data stream in that secure location in a secure manner, thereby minimizing unauthorized access. In addition, the EDC supports the secure display of the data stream using standard (or proprietary) encryption techniques, and/or obfuscation techniques. The EDC also optionally supports various requirements for complying with the usage limitations typically associated with DRM data content. In one embodiment, the enhanced display controller is a modified set-top display (device) driver that includes a VBI decoder, mechanisms (e.g.
    Type: Application
    Filed: June 15, 2009
    Publication date: October 8, 2009
    Inventors: Jason M. Smith, D. David Nason, John A. Painter, William J. Heaton
  • Patent number: 7007025
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Grant
    Filed: June 10, 2002
    Date of Patent: February 28, 2006
    Assignee: xSides Corporation
    Inventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
  • Publication number: 20050204165
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Application
    Filed: February 11, 2005
    Publication date: September 15, 2005
    Applicant: xSides Corporation
    Inventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
  • Publication number: 20050149485
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Application
    Filed: January 25, 2005
    Publication date: July 7, 2005
    Applicant: xSides Corporation
    Inventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
  • Publication number: 20050149486
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Application
    Filed: January 25, 2005
    Publication date: July 7, 2005
    Applicant: xSides Corporation
    Inventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
  • Publication number: 20050108525
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Application
    Filed: December 10, 2004
    Publication date: May 19, 2005
    Applicant: xSides Corporation
    Inventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
  • Publication number: 20050102266
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Application
    Filed: December 10, 2004
    Publication date: May 12, 2005
    Applicant: xSides Corporation
    Inventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
  • Publication number: 20050102264
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Application
    Filed: November 18, 2004
    Publication date: May 12, 2005
    Applicant: xSides Corporation
    Inventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
  • Publication number: 20050086666
    Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.
    Type: Application
    Filed: November 18, 2004
    Publication date: April 21, 2005
    Applicant: xSides Corporation
    Inventors: D. Nason, Carson Kaan, John Easton, Jason Smith, John Painter, William Heaton
  • Publication number: 20030001978
    Abstract: Methods and systems for enhancing the storage and display of video data and other digital content in a set-top box or other television environment so that such data is securely stored and displayed are provided. Example embodiments provide an enhanced display controller (EDC) that executes in an electronic device, such as a set-top box, to provide secure storage and playback of streamed digital content. The EDC creates or identifies a secure storage location and stores the data stream in that secure location in a secure manner, thereby minimizing unauthorized access. In addition, the EDC supports the secure display of the data stream using standard (or proprietary) encryption techniques, and/or obfuscation techniques. The EDC also optionally supports various requirements for complying with the usage limitations typically associated with DRM data content. In one embodiment, the enhanced display controller is a modified set-top display (device) driver that includes a VBI decoder, mechanisms (e.g.
    Type: Application
    Filed: June 12, 2002
    Publication date: January 2, 2003
    Applicant: xSides Corporation
    Inventors: Jason M. Smith, D. David Nason, John A. Painter, William J. Heaton
  • Patent number: 6256069
    Abstract: The generation of progressive output video from interlaced source video is disclosed. In one aspect of the invention, a computerized system includes an interlaced source video and a progressive output video. The interlaced source video has a number of lines and includes a first field having odd lines and a second field haveing even lines. The progressive output video has a number of lines half that of the number of lines of the interlaced source video. Each line of the progressive output video heavily weight weights a corresponding line of each of the first field and the second field of the interlaced source video. Desirably, each line of the progressive output video also lightly weights an immediately successive and an immediately preceding line of each of the first field and the second field of the interlaced video source.
    Type: Grant
    Filed: October 6, 1998
    Date of Patent: July 3, 2001
    Assignee: Microsoft Corporation
    Inventors: Andrew D. Rosen, William J. Heaton, John A. Painter, Philip G. Zack
  • Patent number: 6251113
    Abstract: A system for controlling a plurality of ophthalmic microsurgical instruments connected thereto. The microsurgical instruments are for use by a user such as a surgeon in performing ophthalmic surgical procedures. The system includes a data communications bus and a user interface connected to the data communications bus. The user interface provides information to the user and receives information from the user which is representative of operating parameters of the microsurgical instruments. The system also includes surgical modules connected to and controlling the microsurgical instruments as a function of at least one of the operating parameters. The surgical modules are also connected to the data communications bus. The data communications bus provides communication of data representative of the operating parameters between the user interface and the surgical modules.
    Type: Grant
    Filed: August 28, 1997
    Date of Patent: June 26, 2001
    Assignee: Bausch & Lomb Surgical, Inc.
    Inventors: Peter Francis Appelbaum, Michael Evremonde Bisch, Bruce Robert Cochran, Christopher Michael Eberhardt, Jeffery Alan Knight, John A. Painter, John Alan Ritter
  • Patent number: 6179829
    Abstract: A foot control assembly for a microsurgical system for controlling a plurality of ophthalmic microsurgical instruments connected thereto. The microsurgical instruments are for use by a user such as a surgeon in performing ophthalmic surgical procedures. The system includes a data communications bus and a user interface connected to the data communications bus. The user interface provides information to the user and receives information from the user which is representative of operating parameters of the microsurgical instruments. The system also includes surgical modules connected to and controlling the microsurgical instruments as a function of at least one of the operating parameters. The surgical modules are also connected to the data communications bus. The data communications bus provides communication of data representative of the operating parameters between the user interface and the surgical modules.
    Type: Grant
    Filed: August 28, 1997
    Date of Patent: January 30, 2001
    Assignee: Bausch & Lomb Surgical, Inc.
    Inventors: Michael Evremonde Bisch, Bruce Robert Cochran, Christopher Michael Eberhardt, Stanley Curtis McFerran, John A. Painter, Michael Andrew Wagner
  • Patent number: 6106512
    Abstract: A system for controlling a plurality of ophthalmic microsurgical instruments connected thereto. The microsurgical instruments are for use by a user such as a surgeon in performing ophthalmic surgical procedures. The system includes a data communications bus and a user interface connected to the data communications bus. The user interface provides information to the user and receives information from the user which is representative of operating parameters of the microsurgical instruments. The system also includes surgical modules connected to and controlling the microsurgical instruments as a function of at least one of the operating parameters. The surgical modules are also connected to the data communications bus. The data communications bus provides communication of data representative of the operating parameters between the user interface and the surgical modules.
    Type: Grant
    Filed: December 9, 1998
    Date of Patent: August 22, 2000
    Assignee: Bausch & Lomb Surgical, Inc.
    Inventors: Bruce Robert Cochran, Christopher Michael Eberhardt, John A. Painter
  • Patent number: 6081264
    Abstract: An optimal frame rate selection user interface is disclosed. In one aspect of the invention, a method has two steps. First, a video clip is displayed within at least one window, to permit dividing the clip into a plurality of shots (where each shot has a plurality of frames). Second, each shot is displayed in at least two windows, to permit selecting a desired frame rate for each shot. Desirably, each of these windows displays a given shot at a different frame rate. Therefore, a user is able to view each shot at a number of different frame rates to determine an optimal frame rate for each shot.
    Type: Grant
    Filed: February 13, 1998
    Date of Patent: June 27, 2000
    Assignee: Microsoft Corporation
    Inventors: Andrew D. Rosen, Brian D. Honey, William J. Heaton, John A. Painter, Philip G. Zack
  • Patent number: 6055458
    Abstract: A system for controlling a plurality of ophthalmic microsurgical instruments connected thereto. The microsurgical instruments are for use by a user such as a surgeon in performing ophthalmic surgical procedures. The system includes a data communications bus and a user interface connected to the data communications bus. The user interface provides information to the user and receives information from the user which is representative of operating parameters of the microsurgical instruments. The system also includes surgical modules connected to and controlling the microsurgical instruments as a function of at least one of the operating parameters. The surgical modules are also connected to the data communications bus. The data communications bus provides communication of data representative of the operating parameters between the user interface and the surgical modules.
    Type: Grant
    Filed: August 28, 1997
    Date of Patent: April 25, 2000
    Assignee: Bausch & Lomb Surgical, Inc.
    Inventors: Bruce Robert Cochran, Christopher Michael Eberhardt, John A. Painter