Patents by Inventor Marc Charbonneau
Marc Charbonneau has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9454387Abstract: According to the invention, a first executable environment is provided. The first executable environment is for execution within an operating system environment of a host computer system. The first executable environment is not an emulator for emulating any of another processor and another operating system. A software application is provided for installation and execution within the operating system environment. The software application is for fixed installation and not for installation in a portable fashion for being ported from one host computer system to another. The software application is then installed within the first executable environment, the installed software application installed within a removable peripheral memory storage device for execution within the first executable environment.Type: GrantFiled: September 7, 2012Date of Patent: September 27, 2016Assignee: Kingston Digital, Inc.Inventors: Laurence Hamid, Marc Charbonneau
-
Publication number: 20130067457Abstract: According to the invention, a first executable environment is provided. The first executable environment is for execution within an operating system environment of a host computer system. The first executable environment is not an emulator for emulating any of another processor and another operating system. A software application is provided for installation and execution within the operating system environment. The software application is for fixed installation and not for installation in a portable fashion for being ported from one host computer system to another. The software application is then installed within the first executable environment, the installed software application installed within a removable peripheral memory storage device for execution within the first executable environment.Type: ApplicationFiled: September 7, 2012Publication date: March 14, 2013Applicant: Imation Corp.Inventors: Laurence Hamid, Marc Charbonneau
-
Patent number: 8286158Abstract: According to the invention, a first executable environment is provided. The first executable environment is for execution within an operating system environment of a host computer system. The first executable environment is not an emulator for emulating any of another processor and another operating system. A software application is provided for installation and execution within the operating system environment. The software application is for fixed installation and not for installation in a portable fashion for being ported from one host computer system to another. The software application is then installed within the first executable environment, the installed software application installed within a removable peripheral memory storage device for execution within the first executable environment.Type: GrantFiled: February 6, 2006Date of Patent: October 9, 2012Assignee: Imation Corp.Inventors: Laurence Hamid, Marc Charbonneau
-
Publication number: 20090155560Abstract: A scented paper laminate having a desired scent comprises a first paper substrate; a second paper substrate; and a scented water-based adhesive composition providing bonding between the first and the second paper substrates together, the scented paper laminate having a moisture level below 10 wt %. A method for manufacturing a scented paper laminate having a moisture level below 10 wt %, the method comprises the steps of: applying a scented water-based adhesive composition to a first face of a first paper substrate; laminating a second paper substrate to the first face of the first paper substrate; and controlling the moisture level of the scented paper laminate.Type: ApplicationFiled: December 17, 2007Publication date: June 18, 2009Inventors: Stephane LEFEBVRE, Daniel MASSE, Frederic PERRIER, Germain PERRIER, Yvan GIRARDIN, Robert BOIVIN, Marc CHARBONNEAU
-
Patent number: 7526654Abstract: Disclosed is a method for detecting unauthorized applications in execution within a computer system, such as for instance one of a Trojan horse application and a virus, prior to providing security data from a trusted source. According to the instant invention, a security application computes a hash value in dependence upon predetermined data in system memory and compares said computed hash value to a trusted hash value that was obtained when the system was in a verified secure state. The data is provided from the trusted source to an application in execution on the computer system only if the computed hash value and the trusted hash value are indicative of a same trusted state.Type: GrantFiled: October 16, 2001Date of Patent: April 28, 2009Inventor: Marc Charbonneau
-
Patent number: 7506171Abstract: A system and method of securely supporting password change is disclosed. The method performed by the system includes the steps of detecting an occurrence of a password change operation in execution on a system and receiving a new password by the system; detecting the new password when provided; storing data indicative of the new password in a database independent of the password database of the system for later retrieval; and providing the data indicative of the new password from the independent database to the password database.Type: GrantFiled: May 29, 2007Date of Patent: March 17, 2009Assignee: Activcard Ireland LimitedInventor: Marc Charbonneau
-
Publication number: 20070234344Abstract: According to the invention, a first executable environment is provided. The first executable environment is for execution within an operating system environment of a host computer system. The first executable environment is not an emulator for emulating any of another processor and another operating system. A software application is provided for installation and execution within the operating system environment. The software application is for fixed installation and not for installation in a portable fashion for being ported from one host computer system to another. The software application is then installed within the first executable environment, the installed software application installed within a removable peripheral memory storage device for execution within the first executable environment.Type: ApplicationFiled: February 6, 2006Publication date: October 4, 2007Inventors: Laurence Hamid, Marc Charbonneau
-
Publication number: 20070226791Abstract: A system and method of securely supporting password change is disclosed. The method performed by the system includes the steps of detecting an occurrence of a password change operation in execution on a system and receiving a new password by the system; detecting the new password when provided; storing data indicative of the new password in a database independent of the password database of the system for later retrieval; and providing the data indicative of the new password from the independent database to the password database.Type: ApplicationFiled: May 29, 2007Publication date: September 27, 2007Applicant: Activcard Ireland LimitedInventor: Marc Charbonneau
-
Patent number: 7249261Abstract: A method of securely supporting password change is disclosed. The method comprises the steps of: detecting an occurrence of a password change operation in execution on a system and receiving a new password by the system; detecting the new password when provided; storing data indicative of the new password in a database other than the password database of the system for later retrieval, the data indicative of the new password for provision to the system.Type: GrantFiled: October 16, 2001Date of Patent: July 24, 2007Assignee: Activcard Ireland LimitedInventor: Marc Charbonneau
-
Publication number: 20060200612Abstract: A method is disclosed for transferring data via a USB interface. A workstation is provided having an interface therein supporting a first set of known commands. A USB device is provided for interfacing with the interface and supporting a second set of known commands, the second set including some commands absent from the first set of commands. A first command is provided from the second set of commands and absent from the first set of commands for execution on the USB device. The first command is provided on the workstation. The first command is encapsulated within data associated with a second other command, the second other command within the first set of commands. The first command is encapsulated within the data for extraction thereof. The second other command and the data associated with a second other command are transmitted to the USB device via the interface. Once received, the first command is extracted from the second other command and the first command is executed on the USB device.Type: ApplicationFiled: March 2, 2005Publication date: September 7, 2006Inventors: Laurence Hamid, Marc Charbonneau
-
Publication number: 20030074585Abstract: A method of securely supporting password change is disclosed. The method comprises the steps of: detecting an occurrence of a password change operation in execution on a system and receiving a new password by the system; detecting the new password when provided; storing data indicative of the new password in a database other than the password database of the system for later retrieval, the data indicative of the new password for provision to the system.Type: ApplicationFiled: October 16, 2001Publication date: April 17, 2003Inventor: Marc Charbonneau
-
Publication number: 20030074567Abstract: Disclosed is a method for detecting unauthorized applications in execution within a computer system, such as for instance one of a Trojan horse application and a virus, prior to providing security data from a trusted source. According to the instant invention, a security application computes a hash value in dependence upon predetermined data in system memory and compares said computed hash value to a trusted hash value that was obtained when the system was in a verified secure state. The data is provided from the trusted source to an application in execution on the computer system only if the computed hash value and the trusted hash value are indicative of a same trusted state.Type: ApplicationFiled: October 16, 2001Publication date: April 17, 2003Inventor: Marc Charbonneau