Patents by Inventor Kenneth Largman

Kenneth Largman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8775369
    Abstract: System, method, computer, and computer program for secure data processing of potentially malicious code and documents or other data that may contain malicious code. System, method, computer for a secure and reliable computing environment to protect against data loss and/or corruption to provide secure and reliable data processing.
    Type: Grant
    Filed: January 24, 2008
    Date of Patent: July 8, 2014
    Assignee: VIR2US, Inc.
    Inventors: Kenneth Largman, Anthony More, Kip Macy, Shannon Bailey
  • Publication number: 20110191851
    Abstract: System, method, computer, and computer program and computer program product for safe usage of potentially malicious code and documents or other content to may contain malicious code. System and method for a virus and hacker-resistant computer. Method and system for supporting a computer systems self repair.
    Type: Application
    Filed: August 25, 2010
    Publication date: August 4, 2011
    Applicant: VIR2US, Inc.
    Inventors: Kenneth Largman, Anthony B. More, Jeffrey Blair
  • Publication number: 20110145923
    Abstract: A method or system for supporting a computer systems self repair, including the computer executed steps for booting from a first boot device, and booting from a second boot device in response to a signal indicating a need for repair. While booted from the second boot device the computer system is capable of repairing software on the first boot device. The signal may effect a logical or physical switch. Repairing software may be performed in part by copying, template, backup or archive software from a device other than the first boot device. Repairing software may be performed automatically without direction by a user or according to preset preferences. Computer architecture having special purpose subsystems that provides cyber-terror and virus immunity and protection features.
    Type: Application
    Filed: July 7, 2010
    Publication date: June 16, 2011
    Inventors: Kenneth Largman, Anthony B. More, Jeffrey Blair
  • Patent number: 7849360
    Abstract: The invention may back up or recover a computing device. The computing device may include a user computing environment and a supporting environment which stabilizes and functionality of the user computing environment. The invention may include one or more external devices or removable media.
    Type: Grant
    Filed: February 16, 2006
    Date of Patent: December 7, 2010
    Assignee: Vir2us, Inc.
    Inventors: Kenneth Largman, Anthony B. More, Jeffrey Blair
  • Patent number: 7788699
    Abstract: System, method, computer, and computer program and computer program product for safe usage of potentially malicious code and documents or other content to may contain malicious code. System and method for a virus and hacker-resistant computer. Method and system for supporting a computer systems self repair.
    Type: Grant
    Filed: April 10, 2006
    Date of Patent: August 31, 2010
    Assignee: Vir2us, Inc.
    Inventors: Kenneth Largman, Anthony B. More, Jeffrey Blair
  • Publication number: 20100192011
    Abstract: An apparatus and method of supporting the backup and recovery of a computing device. The computing device typically includes both a user computing environment and a supporting environment which enhances the stability and functionality of the user computing environment.
    Type: Application
    Filed: August 18, 2009
    Publication date: July 29, 2010
    Inventors: Kenneth Largman, Anthony More, Jeffrey Blair
  • Publication number: 20100005531
    Abstract: Information appliance, computing device, or other processor or microprocessor based device or system provides security and anti-viral, anti-hacker, and anti-cyber terror features, and can automatically create multiple sequentially or concurrently and intermittently isolated and/or restricted computing environments to prevent viruses, malicious or other computer hacking, computer or device corruption and failure by using these computing environments in conjunction with restricted and controlled methods of moving and copying data, combined with a process that destroys malicious code located in computing environments and data stores. Time multiplexed processing streams with system, device, architecture and method for maintaining isolation of multiple processes executing in single physical processor. Virtual multi-dimensional processing space and virtual processing environments. Temporally multiplexed processing in a single CPU. Process isolation using address control and mapping.
    Type: Application
    Filed: December 23, 2004
    Publication date: January 7, 2010
    Inventors: Kenneth Largman, Anthony B. More, Jeffrey Blair
  • Patent number: 7577871
    Abstract: An apparatus and method of supporting the backup and recovery of a computing device. The computing device typically includes both a user computing environment and a supporting environment which enhances the stability and functionality of the user computing environment.
    Type: Grant
    Filed: February 16, 2006
    Date of Patent: August 18, 2009
    Assignee: Vir2us, Inc.
    Inventors: Kenneth Largman, Anthony More, Jeffrey Blair
  • Patent number: 7571353
    Abstract: The invention may backup, maintain backups, or recover data associated with a computing system. The computing system may include any number of components including hardware and software, and any memory accessible to the computing system. The computing system may focus on a user computing system and potentially the supporting environment which stabilizes the functionality of the user computing system (e.g., operating system, BIOS, etc.). Typically data associated with the computing system is identified by a variety of characteristics, the data is stored as a backup, and subsequently data within the backup may be restored or used to evaluate an existing computing system.
    Type: Grant
    Filed: February 16, 2006
    Date of Patent: August 4, 2009
    Assignee: Vir2us, Inc.
    Inventors: Kenneth Largman, Anthony B. More, Jeffrey Blair
  • Patent number: 7536598
    Abstract: A method for a computer repairing itself to an operational status at any time during operation, the method comprising the computer-executed steps of: booting from a first hard disk drive boot device disposed within a main computer hardware box of the computer; then, in response to a signal indicating a need for repair of the computer during the booting or during any operating state, booting from a second hard disk drive boot device also disposed within the main computer hardware box of the computer prior to the signal indicating a need for repair; and then repairing software on the first hard disk drive while booted from the second hard disk drive boot device and selectively either: (i) maintaining operation of the computer from the second boot device to restore operational status of the computer during repairing of the software on the first hard disk device, or (ii) changing to operation of the computer from the second boot device to the first boot device to restore operational status of the computer.
    Type: Grant
    Filed: November 19, 2002
    Date of Patent: May 19, 2009
    Assignee: Vir2us, Inc.
    Inventors: Kenneth Largman, Anthony B. More, Jeffrey Blair
  • Publication number: 20080244743
    Abstract: Information appliance, computing device, or other processor or microprocessor based device or system provides security and anti-viral, anti-hacker, and anti-cyber terror features, and can automatically create multiple sequentially or concurrently and intermittently isolated and/or restricted computing environments to prevent viruses, malicious or other computer hacking, computer or device corruption and failure by using these computing environments in conjunction with restricted and controlled methods of moving and copying data, combined with a process that destroys malicious code located in computing environments and data stores.
    Type: Application
    Filed: January 28, 2008
    Publication date: October 2, 2008
    Inventors: Kenneth Largman, Anthony B. More, Jeffrey Blair
  • Publication number: 20080215852
    Abstract: System, device, device architecture, and method for operating a multi-core processor providing application level file isolation and providing display frame buffer aggregator or selector to provide a user with the experience of multiple simultaneous application execution within a single processor while actually providing separate concurrent but isolated processing sessions.
    Type: Application
    Filed: August 30, 2007
    Publication date: September 4, 2008
    Inventors: Kenneth Largman, Anthony B. More, Jeffrey Blair, Arthur Abraham
  • Publication number: 20080184218
    Abstract: System, method, computer, and computer program for secure data processing of potentially malicious code and documents or other data that may contain malicious code. System, method, computer for a secure and reliable computing environment to protect against data loss and/or corruption to provide secure and reliable data processing.
    Type: Application
    Filed: January 24, 2008
    Publication date: July 31, 2008
    Inventors: Kenneth Largman, Anthony More, Kip Macy, Shannon Bailey
  • Patent number: 7392541
    Abstract: Information appliance, computing device, or other processor or microprocessor based device or system provides security and anti-viral, anti-hacker, and anti-cyber terror features, and can automatically create multiple sequentially or concurrently and intermittently isolated and/or restricted computing environments to prevent viruses, malicious or other computer hacking, computer or device corruption and failure by using these computing environments in conjunction with restricted and controlled methods of moving and copying data, combined with a process that destroys malicious code located in computing environments and data stores.
    Type: Grant
    Filed: January 15, 2004
    Date of Patent: June 24, 2008
    Assignee: Vir2us, Inc.
    Inventors: Kenneth Largman, Anthony B. More, Jeffrey Blair
  • Publication number: 20080127348
    Abstract: Network computer system and method using thin user client and virtual machine to provide immunity to hacking, viruses and spyware. A system architecture and computing machine operating as a server executing virtualization software to generate a plurality of virtual machines as virtual desktops for a plurality of users, the environment to support application program processing by a plurality of users and providing a level of isolation that prevents user data and system operating system and application program templates from being corrupted by virus, hacker code or attack, spy-ware, bots, or other malicious code or attacks.
    Type: Application
    Filed: August 30, 2007
    Publication date: May 29, 2008
    Inventors: Kenneth Largman, Anthony B. More, Jeffrey Blair, Kip Macy
  • Publication number: 20070106993
    Abstract: This invention relates generally to computer security and more particularly to operating system virtualization achieved by inserting a hypervisor layer between the operating system and the underlying hardware that is responsible for allowing multiple operating system instances and their running applications to share the resources of a single machine.
    Type: Application
    Filed: October 23, 2006
    Publication date: May 10, 2007
    Inventors: Kenneth Largman, Anthony More, Jeffrey Blair, Kip Macy
  • Publication number: 20060277433
    Abstract: A method or system for supporting a computer systems self repair, including the computer executed steps for booting from a first boot device, and booting from a second boot device in response to a signal indicating a need for repair. While booted from the second boot device the computer system is capable of repairing software on the first boot device. The signal may effect a logical or physical switch. Repairing software may be performed in part by copying, template, backup or archive software from a device other than the first boot device. Repairing software may be performed automatically without direction by a user or according to preset preferences. Computer architecture having special purpose subsystems that provides cyber-terror and virus immunity and protection features.
    Type: Application
    Filed: July 26, 2006
    Publication date: December 7, 2006
    Inventors: Kenneth Largman, Anthony More, Jeffrey Blair
  • Publication number: 20060272017
    Abstract: System, method, computer, and computer program and computer program product for safe usage of potentially malicious code and documents or other content to may contain malicious code. System and method for a virus and hacker-resistant computer. Method and system for supporting a computer systems self repair.
    Type: Application
    Filed: April 10, 2006
    Publication date: November 30, 2006
    Inventors: Kenneth Largman, Anthony More, Jeffrey Blair
  • Patent number: 7137034
    Abstract: A method or system for supporting a computer systems self repair, including the computer executed steps for booting from a first boot device, and booting from a second boot device in response to a signal indicating a need for repair. While booted from the second boot device the computer system is capable of repairing software on the first boot device. The signal may effect a logical or physical switch. Repairing software may be performed in part by copying, template, backup or archive software from a device other than the first boot device. Repairing software may be performed automatically without direction by a user or according to preset preferences.
    Type: Grant
    Filed: March 6, 2002
    Date of Patent: November 14, 2006
    Assignee: Vir2us, Inc.
    Inventors: Kenneth Largman, Anthony B. More, Jeffrey Blair
  • Patent number: 7111201
    Abstract: The invention may backup, maintain backups, or recover data associated with a computing system. The computing system may include any number of components including hardware and software, and any memory accessible to the computing system. The computing system may focus on a user computing system and potentially the supporting environment which stabilizes the functionality of the user computing system (e.g., operating system, BIOS, etc.). Typically data associated with the computing system is identified by a variety of characteristics, the data is stored as a backup, and subsequently data within the backup may be restored or used to evaluate an existing computing system.
    Type: Grant
    Filed: February 27, 2002
    Date of Patent: September 19, 2006
    Assignee: Self Repairing Computers, Inc.
    Inventors: Kenneth Largman, Anthony B. More, Jeffrey Blair