Patents by Inventor John A. Thywissen

John A. Thywissen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9002012
    Abstract: Apparatus, and an associated method, for maintaining data, such as a data file, in secure form. Security keys are stored and maintained at a central location. The security key is downloaded to a device that is to operate upon the data. When the security key is authorized to be downloaded to a computer device, a time boundary is associated with the security key. The time boundary defines the period of usability of the security key. The security key is used at the computer device to encrypt the data each time the data is written to storage and to decrypt the data each time the data is read from storage. Thereby, at all times, when the data is stored at storage, the data is maintained in secure form.
    Type: Grant
    Filed: December 1, 2007
    Date of Patent: April 7, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: John A. Thywissen
  • Patent number: 8332331
    Abstract: A method includes accessing project information that includes values for one or more parameters of a project. The method further includes determining from the project information a project duration for the project, a time value of money for the project, a variability for the project, and an expected project price. A price premium for the project is generated according to the project duration, the time value of money, the variability value, and the expected project price, using an option-pricing mathematical model for financial instruments.
    Type: Grant
    Filed: March 19, 2007
    Date of Patent: December 11, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: John A. Thywissen
  • Publication number: 20090141902
    Abstract: Apparatus, and an associated method, for maintaining data, such as a data file, in secure form. Security keys are stored and maintained at a central location. The security key is downloaded to a device that is to operate upon the data. When the security key is authorized to be downloaded to a computer device, a time boundary is associated with the security key. The time boundary defines the period of usability of the security key. The security key is used at the computer device to encrypt the data each time the data is written to storage and to decrypt the data each time the data is read from storage. Thereby, at all times, when the data is stored at storage, the data is maintained in secure form.
    Type: Application
    Filed: December 1, 2007
    Publication date: June 4, 2009
    Applicant: ELECTRONIC DATA SYSTEMS CORPORATION
    Inventor: JOHN A. THYWISSEN
  • Publication number: 20080235155
    Abstract: In certain embodiments, a method for determining a price premium for a project includes accessing project information that includes values for one or more parameters of a project. The method further includes determining from the project information a project duration for the project, a time value of money for the project, a variability for the project, and an expected project price. A price premium for the project is generated according to the project duration, the time value of money, the variability value, and the expected project price, using an option-pricing mathematical model for financial instruments.
    Type: Application
    Filed: March 19, 2007
    Publication date: September 25, 2008
    Applicant: Electronic Data Systems Corporation
    Inventor: John A. Thywissen