Patents by Inventor Mark Ogram

Mark Ogram has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070256691
    Abstract: A conception aid which places a treatment for the sperm within the vagina of the female. The treatment creates either an alkaline or an acidic environment through which the sperm must pass. This environment encourages either the Y-sperm or the X-Sperm. Delivery of the treatment is through a variety of mechanisms including: specially designed condoms; special diaphragms; vaginal suppositories; and, lubricants.
    Type: Application
    Filed: April 19, 2006
    Publication date: November 8, 2007
    Inventors: Mark Ogram, Karen Ogram
  • Publication number: 20070180138
    Abstract: A communications system particularly suited for a distributed network of computers such as the World Wide Web or the Internet. Connected to the distributed network is a broadcast computer which simultaneously communicates two streams of video. The first stream of video contains entertainment; the second stream of video contains commercial content. The receiver of the two streams has both streams displayed simultaneously and is able to select which stream's audio component is communicated to the user's computer's loudspeakers. In one embodiment of the invention, the user is also able to replace the commercial channel with another commercial channel.
    Type: Application
    Filed: February 20, 2007
    Publication date: August 2, 2007
    Inventor: Mark Ogram
  • Publication number: 20060291655
    Abstract: A system for communication of a message in which the message intended for a third computer is first encrypted by a first computer and is sent to a second computer. The second computer, acting as an intermediary, +decrypts the message and re-encrypts the message before sending the message to the third computer which again decrypts the message.
    Type: Application
    Filed: August 10, 2005
    Publication date: December 28, 2006
    Inventor: Mark Ogram
  • Publication number: 20060291647
    Abstract: A communications system in which a sending computer encrypts a message using a key associated with the computer which is to receive the message; and the receiving computer uses a key associated with the sending computer in the decryption process. The sending computer is equipped with a set of keys and each key within the set may be used for the encryption process, depending on the destination of the message; and the receiving computer chooses its key based on who the sending computer is.
    Type: Application
    Filed: June 28, 2005
    Publication date: December 28, 2006
    Inventor: Mark Ogram
  • Publication number: 20060294395
    Abstract: A computer system which is configured to load executable programs. This configuration first accepts an operator defined key; withdraws an encrypted executable program from memory; and, using the operator defined key, decrypts the encrypted executable program into a functional executable program. It is this functional executable program which is used by the processing unit. During shutdown, each executable program is checked to see if it was derived from an encrypted executable program; those that aren't, are verified as being legitimate by the operator prior to their storage into the memory.
    Type: Application
    Filed: September 8, 2005
    Publication date: December 28, 2006
    Inventor: Mark Ogram
  • Publication number: 20060291700
    Abstract: A signature authentication system which uses a digital key having a user identification stored therein. The digital key is read by a signatory computer; another computer has a document stored therein. The invention provides an authorizing computer having the capability to: receive the user identification from the signatory computer and generate a verification index based upon said user identification; receive the document from said document computer; store the user identification, the document, and the verification index within a memory; and communicate an indicia of said verification index to the signatory computer indicating that the process has been completed.
    Type: Application
    Filed: June 8, 2005
    Publication date: December 28, 2006
    Inventor: Mark Ogram
  • Publication number: 20060291699
    Abstract: An identity authentication system which uses a user identification from a digital key together with a representation of evidence of identity of a user in determining if the proper party is providing the “signature”. The authentication of the “signing” individual is made by an authorizing computer which has a memory containing a pre-defined evidence of an identity of the user of said digital key together with a pre-defined user identification. These two items are used for a comparison with the submitted material in creating a verification index. This verification index is communicated to the a remote computer and is used, in some embodiments, when storing a document which has been “signed”.
    Type: Application
    Filed: June 8, 2005
    Publication date: December 28, 2006
    Inventor: Mark Ogram
  • Publication number: 20060235988
    Abstract: A communications system particularly suited for a distributed network of computers such as the World Wide Web or the Internet. Connected to the distributed network is a broadcast computer which simultaneously communicates two streams of video. The first stream of video is of entertainment content; the second stream of video contains commercial content. The receiver of the two streams has both streams displayed simultaneously and is able to select which stream's audio component is played to the user's computer's loudspeakers. In one embodiment of the invention, the user is also able to replace the commercial channel with another selected commercial channel.
    Type: Application
    Filed: March 26, 2001
    Publication date: October 19, 2006
    Inventor: Mark Ogram
  • Publication number: 20060136733
    Abstract: A software distribution system which uses a removable medium for distribution of software programs. In the preferred embodiment, a primary software program and a secondary software program are used. The secondary software program is used to establish an identifier and then to erase the secondary software program from all files. This identifier is used by the primary software program to assure it is running on the proper computer; if the identifier is not there, then the software program terminates. In alternative embodiments, the identifier is established using a downloaded secondary software program or by a download of the identifier from the manufacturer of the primary software program. In some embodiments, the identifier is stored on a removable medium, thereby forming a “key” which used when the primary software is to be operated.
    Type: Application
    Filed: December 16, 2004
    Publication date: June 22, 2006
    Inventor: Mark Ogram
  • Publication number: 20060137027
    Abstract: A system for the protection of software from unauthorized copying in which the downloading process changes the overall length of the executable software. This process allows the production of differing versions of the same software. Because of the variety of executable lengths, it becomes impractical for the software “pirate” to create software patches to avoid any security components within the software package.
    Type: Application
    Filed: March 28, 2005
    Publication date: June 22, 2006
    Inventors: Julian Rogers, Mark Ogram
  • Publication number: 20060070119
    Abstract: An Internet voting system which preserves the integrity of a data base containing records of cast votes. A vote collection computer operating on the Internet accepts a voter identification from a remote computer. If the voter identification is confirmed through a check of a data base, a query (i.e. the ballot) is sent to the voter and a response (i.e. a vote) to said query is accepted from the voter. A record of the response is then stored within a group of storage computers. This group of storage computers is chosen as a subset of a set of storage computers. By changing the subset of storage computers as votes are received, the ability of a hacker to gain access to the entire record and cause errors to occur is minimized or destroyed.
    Type: Application
    Filed: September 7, 2004
    Publication date: March 30, 2006
    Inventor: Mark Ogram
  • Publication number: 20050081001
    Abstract: A system which discourages corruption of data within a network of computers. A refresh computer monitors the information within a hosting computer and periodically refreshes the information. The hosting computer provides the information to remote computers via the network. The refreshing action occurs either periodically or when a corruption of the information is detected. In some embodiments of the invention the hosting computer and the refresh computer are contained within the same housing; in other embodiments, the hosting computer and the refreshing computer communicate via the primary network or a secondary network.
    Type: Application
    Filed: October 1, 2004
    Publication date: April 14, 2005
    Inventor: Mark Ogram