Patents by Inventor Kelce S. Wilson

Kelce S. Wilson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180302417
    Abstract: Systems and methods are disclosed which use a block chain (“blockchain”) to enable the establishment of file dates and the absence of tampering, even for documents held in secrecy and those stored in uncontrolled environments, but which does not require trusting a timestamping authority or document archival service. In an exemplary operation, an internet browser retrieves a website document, hashes at least a portion of the website document to produce a first hash value, retrieves blockchain registration data for the website document; compares the first hash value with a second hash value found in a blockchain; and responsive to the first and second hash values matching, displays a verification indication. Some embodiments may be used as parental controls for internet browsers.
    Type: Application
    Filed: June 26, 2018
    Publication date: October 18, 2018
    Inventor: Kelce S. Wilson
  • Publication number: 20170329996
    Abstract: A system and method are disclosed for rendering published documents tamper evident. Embodiments render classes of documents tamper evident with cryptographic level security or detect tampering events, where such security was previously unavailable, for example, in documents printed using common printers without special paper or ink. Embodiments enable proving the date of document content without the need for expensive third party archival, including documents held, since their creation, entirely in secrecy or in untrustworthy environments, such as on easily-altered, publicly-accessible internet sites. Embodiments can use a document's prior registration date in a blockchain to establish a no-later-than date-of-existence for that document. Embodiments can extend the useful life of integrity verification algorithms, such as hash functions, even when applied to binary executable files.
    Type: Application
    Filed: July 31, 2017
    Publication date: November 16, 2017
    Inventor: Kelce S. Wilson
  • Patent number: 9754131
    Abstract: A system and method are disclosed for rendering published documents tamper evident. Embodiments render classes of documents tamper evident with cryptographic level security or detect tampering, where such security was previously unavailable, for example, documents printed using common printers without special paper or ink. Embodiments enable proving the date of document content without the need for expensive third party archival, including documents held, since their creation, entirely in secrecy or in untrustworthy environments, such as on easily-altered, publicly-accessible internet sites. Embodiments can extend, by many years, the useful life of currently-trusted integrity verification algorithms, such as hash functions, even when applied to binary executable files. Embodiments can efficiently identify whether multiple document versions are substantially similar, even if they are not identical, thus potentially reducing storage space requirements.
    Type: Grant
    Filed: August 22, 2016
    Date of Patent: September 5, 2017
    Inventor: Kelce S Wilson
  • Patent number: 9531865
    Abstract: A system for restricting operation of wireless devices, for example cell phones, comprises a controller and a plurality of sensors. The system restricts device usage, while permitting emergency phone calls, for example 911 calls. The sensors receive transmissions from devices, and use the transmissions for identification and determining whether a device is within a restricted zone. One disclosed method is triangulation, using time of arrival of transmissions at the sensors. If the device is within the zone, the controller sends device identification, and possibly a customized restriction request, to a remote node, for example a control node of a cell phone network operator. The operator then uses its network resources to implement the requested restrictions. Communication between the controller and the remote node is secure, possibly encrypted, to minimize malicious interference. A wireless control can define vertices of the zone and exempt certain devices from restrictions. Jamming is not required.
    Type: Grant
    Filed: October 22, 2015
    Date of Patent: December 27, 2016
    Inventors: Kristine A. Wilson, Kelce S. Wilson, Edward A. Wilson
  • Publication number: 20160357989
    Abstract: A system and method are disclosed for rendering published documents tamper evident. Embodiments render classes of documents tamper evident with cryptographic level security or detect tampering, where such security was previously unavailable, for example, documents printed using common printers without special paper or ink. Embodiments enable proving the date of document content without the need for expensive third party archival, including documents held, since their creation, entirely in secrecy or in untrustworthy environments, such as on easily-altered, publicly-accessible internet sites. Embodiments can extend, by many years, the useful life of currently-trusted integrity verification algorithms, such as hash functions, even when applied to binary executable files. Embodiments can efficiently identify whether multiple document versions are substantially similar, even if they are not identical, thus potentially reducing storage space requirements.
    Type: Application
    Filed: August 22, 2016
    Publication date: December 8, 2016
    Inventor: Kelce S. Wilson
  • Patent number: 9424440
    Abstract: A system and method are disclosed for rendering published documents tamper evident. Embodiments render classes of documents tamper evident with cryptographic level security or detect tampering, where such security was previously unavailable, for example, documents printed using common printers without special paper or ink. Embodiments enable proving the date of document content without the need for expensive third party archival, including documents held, since their creation, entirely in secrecy or in untrustworthy environments, such as on easily-altered, publicly-accessible internet sites. Embodiments can extend, by many years, the useful life of currently-trusted integrity verification algorithms, such as hash functions, even when applied to binary executable files. Embodiments can efficiently identify whether multiple document versions are substantially similar, even if they are not identical, thus potentially reducing storage space requirements.
    Type: Grant
    Filed: April 6, 2014
    Date of Patent: August 23, 2016
    Inventor: Kelce S Wilson
  • Publication number: 20160212146
    Abstract: Systems and methods are disclosed which use a block chain (“blockchain”) to enable the establishment of file dates and the absence of tampering, even for documents held in secrecy and those stored in uncontrolled environments, but which does not require trusting a timestamping authority or document archival service. A trusted timestamping authority (TTSA) may be used, but even if the TTSA loses credibility or a challenger refuses to acknowledge the validity of a timestamp, a date for an electronic document may still be established. Systems and methods are disclosed which enable detection of file duplication in large collections of documents, which can improve searching for documents within the large collection.
    Type: Application
    Filed: March 30, 2016
    Publication date: July 21, 2016
    Inventor: Kelce S. Wilson
  • Patent number: 9342677
    Abstract: An authentication method, system and device are provided to continuously collect dynamic personal identification data (DPID) samples through a user device by using one or more sensors to continuously collect biometric and location data samples associated with the user and then securely transfer the DPID samples to a central authentication server where attributes of the DPID samples may be captured and incorporated as part of a challenge-response pair which requests an arbitrarily generated N-tuple of the DPID samples from a predetermined time interval from the user device that is unique to the user and dynamic based on the sensed data and the time-interval of collection.
    Type: Grant
    Filed: August 4, 2010
    Date of Patent: May 17, 2016
    Assignee: BlackBerry Limited
    Inventors: Shirook M. Ali, Christopher Labrador, James Warden, Kelce S. Wilson
  • Patent number: 9330261
    Abstract: Systems and methods are disclosed which enable the establishment of file dates and the absence of tampering, even for documents held in secrecy and those stored in uncontrolled environments, but which does not require trusting a timestamping authority or document archival service. A trusted timestamping authority (TTSA) may be used, but even if the TTSA loses credibility or a challenger refuses to acknowledge the validity of a timestamp, a date for an electronic document may still be established. Systems and methods are disclosed which enable detection of file duplication in large collections of documents, which can improve searching for documents within the large collection.
    Type: Grant
    Filed: May 25, 2015
    Date of Patent: May 3, 2016
    Inventor: Kelce S Wilson
  • Publication number: 20160044158
    Abstract: A system for restricting operation of wireless devices, for example cell phones, comprises a controller and a plurality of sensors. The system restricts device usage, while permitting emergency phone calls, for example 911 calls. The sensors receive transmissions from devices, and use the transmissions for identification and determining whether a device is within a restricted zone. One disclosed method is triangulation, using time of arrival of transmissions at the sensors. If the device is within the zone, the controller sends device identification, and possibly a customized restriction request, to a remote node, for example a control node of a cell phone network operator. The operator then uses its network resources to implement the requested restrictions. Communication between the controller and the remote node is secure, possibly encrypted, to minimize malicious interference. A wireless control can define vertices of the zone and exempt certain devices from restrictions. Jamming is not required.
    Type: Application
    Filed: October 22, 2015
    Publication date: February 11, 2016
    Inventors: Kristine A. Wilson, Kelce S. Wilson, Edward A. Wilson
  • Patent number: 9153023
    Abstract: Systems and methods are disclosed which enable more accurate examination of industrial diagnostic images, for example x-ray, ultrasound and terahertz camera images. The systems and methods highlight anomalies that have changed between the collection times of two or more diagnostic images, and can also provide objective scoring of the degree of change.
    Type: Grant
    Filed: July 28, 2014
    Date of Patent: October 6, 2015
    Inventors: Kelce S. Wilson, Susan M. Gaschke, Lawrence Plonsker
  • Publication number: 20150254459
    Abstract: Systems and methods are disclosed which enable the establishment of file dates and the absence of tampering, even for documents held in secrecy and those stored in uncontrolled environments, but which does not require trusting a timestamping authority or document archival service. A trusted timestamping authority (TTSA) may be used, but even if the TTSA loses credibility or a challenger refuses to acknowledge the validity of a timestamp, a date for an electronic document may still be established. Systems and methods are disclosed which enable detection of file duplication in large collections of documents, which can improve searching for documents within the large collection.
    Type: Application
    Filed: May 25, 2015
    Publication date: September 10, 2015
    Inventor: Kelce S. Wilson
  • Publication number: 20150242947
    Abstract: Systems and methods are described for electronic auction of event tickets that permit bidders to bid on a plurality of mutually exclusive ticket options without worry about having to purchase more tickets than desired. The systems and methods also direct collected ticket revenue away from ticket resellers, and toward the event organizers and performers. In an exemplary auction, each bidder places bids for multiple seating options at different locations in the venue. A novel system then calculates which sets of seats should be won by which bidders, in order to optimize auction results according to parameters selected by the auction host. It is possible for a bidder to win tickets for a desired set of seats without being the highest bidder, if the higher bidders for that same set of seats had each won for their own bids on different sets of seats elsewhere in the venue.
    Type: Application
    Filed: May 10, 2015
    Publication date: August 27, 2015
    Inventors: Kalyn A. Wilson, Kelce S. Wilson
  • Patent number: 9053142
    Abstract: Systems and methods are disclosed which enable the establishment of file dates and the absence of tampering, even for documents held in secrecy and those stored in uncontrolled environments, but which does not require trusting a timestamping authority or document archival service. A trusted timestamping authority (TTSA) may be used, but even if the TTSA loses credibility or a challenger refuses to acknowledge the validity of a timestamp, a date for an electronic document may still be established. Systems and methods are disclosed which enable detection of file duplication in large collections of documents, which can improve searching for documents within the large collection.
    Type: Grant
    Filed: November 27, 2011
    Date of Patent: June 9, 2015
    Inventor: Kelce S. Wilson
  • Patent number: 8965341
    Abstract: A system for restricting operation of wireless devices, for example cell phones, comprises a controller and a plurality of sensors. The system restricts device usage, while permitting emergency phone calls, for example 911 calls. The sensors receive transmissions from devices, and use the transmissions for identification and determining whether a device is within a restricted zone. One disclosed method is triangulation, using time of arrival of transmissions at the sensors. If the device is within the zone, the controller sends device identification, and possibly a customized restriction request, to a remote node, for example a control node of a cell phone network operator. The operator then uses its network resources to implement the requested restrictions. Communication between the controller and the remote node is secure, possibly encrypted, to minimize malicious interference. A wireless control can define vertices of the zone and exempt certain devices from restrictions. Jamming is not required.
    Type: Grant
    Filed: February 9, 2013
    Date of Patent: February 24, 2015
    Inventors: Kristine A. Wilson, Kelce S. Wilson, Edward A. Wilson
  • Patent number: 8966646
    Abstract: A method of managing a software license comprises loading a software program into volatile memory, obtaining authorization data, modifying a portion of the volatile memory relied upon by the program in accordance with the authorization data, executing the program, and causing the modifications to be deleted from the volatile memory. In some embodiments, selection criteria compared with the authorization data does not contain information corresponding to all of the content of the authorization data, thereby denying a software attacker the benefit of identifying and exploiting the selection criteria.
    Type: Grant
    Filed: December 24, 2012
    Date of Patent: February 24, 2015
    Inventor: Kelce S. Wilson
  • Patent number: 8903839
    Abstract: Systems and methods are disclosed which enable the establishment of file dates and the absence of tampering, even for documents held in secrecy and those stored in uncontrolled environments, but which does not require trusting a timestamping authority or document archival service. A trusted timestamping authority (TTSA) may be used, but even if the TTSA loses credibility or a challenger refuses to acknowledge the validity of a timestamp, a date for an electronic document may still be established. Systems and methods are disclosed which enable detection of file duplication in large collections of documents, which can improve searching for documents within the large collection.
    Type: Grant
    Filed: April 28, 2013
    Date of Patent: December 2, 2014
    Inventor: Kelce S Wilson
  • Publication number: 20140335846
    Abstract: A system for restricting operation of wireless devices, for example cell phones, comprises a controller and a plurality of sensors. The system restricts device usage, while permitting emergency phone calls, for example 911 calls. The sensors receive transmissions from devices, and use the transmissions for identification and determining whether a device is within a restricted zone. One disclosed method is triangulation, using time of arrival of transmissions at the sensors. If the device is within the zone, the controller sends device identification, and possibly a customized restriction request, to a remote node, for example a control node of a cell phone network operator. The operator then uses its network resources to implement the requested restrictions. Communication between the controller and the remote node is secure, possibly encrypted, to minimize malicious interference. A wireless control can define vertices of the zone and exempt certain devices from restrictions. Jamming is not required.
    Type: Application
    Filed: July 29, 2014
    Publication date: November 13, 2014
    Inventors: Kristine A. Wilson, Kelce S. Wilson, Edward A. Wilson
  • Publication number: 20140334699
    Abstract: Systems and methods are disclosed which enable more accurate examination of industrial diagnostic images, for example x-ray, ultrasound and terahertz camera images. The systems and methods highlight anomalies that have changed between the collection times of two or more diagnostic images, and can also provide objective scoring of the degree of change.
    Type: Application
    Filed: July 28, 2014
    Publication date: November 13, 2014
    Inventors: Kelce S. Wilson, Susan M. Gaschke, Lawrence Plonsker
  • Publication number: 20140325371
    Abstract: A wireless user device has a first antenna operable within a first wireless function frequency band and a second antenna operable within a second wireless function frequency band different than the first operable within a first wireless function frequency band. Circuitry configured to process signals received by the first antenna and the second antenna is further configured to identify and resolve locations of a plurality of remote wireless devices by signal phase comparison. A display screen is configured to display an icon for the identified remote wireless device at an area of the display screen that corresponds to the relative location of the remote wireless device with respect to the user device.
    Type: Application
    Filed: April 26, 2013
    Publication date: October 30, 2014
    Inventors: Kelce S. Wilson, Duc-Ngon T. Pham, Jon M. Jurgovan