Patents by Inventor Michael McFall

Michael McFall has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190342344
    Abstract: Disclosed is a method, a device, and/or a system of controlling permissible actions a computing device can perform on a data resource based on a use policy evaluating an authorized context of the device. In one embodiment, a request is received from a device to use a protected resource stored in a non-hierarchical data structure. A use policy defining an authorized context for which the device can use the protected resource based on contextual value(s) is extracted from a data node. A use transaction is initiated that gathers the contextual values to determine whether the use request satisfies the authorized context. A set of use terms is generated and returned to the device. The protected resource is then streamed to the device, where the device includes a process to enforce ephemerality of the protected resource by maintaining the protected resource in association with the set of use terms.
    Type: Application
    Filed: July 17, 2019
    Publication date: November 7, 2019
    Applicant: Vescel, LLC
    Inventors: Dhryl Anton, Michael McFall
  • Publication number: 20190334724
    Abstract: Disclosed is a method, a device, and/or a system of authentication through verification of an evolving identity credential. In one embodiment, an authentication method includes receiving an identity claim from a device that includes a device root hash of a hashed history of the device, referred to as a device hastory. Data of a user profile associated with the device that includes a profile root hash of a profile hastory is retrieved. The device root hash and the profile root hash, each of which may be computed as the output of a hash function with inputs including one or more previous authentication transactions, are compared and determined to be identical to verify an identity of a user and/or a device. Alternatively, a comparison may be determined to be non-identical and the authentication request rejected and/or the user profile suspended.
    Type: Application
    Filed: July 10, 2019
    Publication date: October 31, 2019
    Applicant: Vescel, LLC
    Inventors: Dhryl Anton, Michael McFall
  • Publication number: 20190327138
    Abstract: Implementations described and claimed herein provided for a system for provisioning network resources. The system includes a network provisioning abstraction layer having an application interface for receiving network provisioning requests from applications and determine provisioning instructions for fulfilling the requests. Each of the received provisioning instructions is queued in a priority queuing system according to a request priority. The provisioning instructions for the highest priority requests are removed from the front of the queue and sent to a resource interface that relays the requests to the appropriate network resources.
    Type: Application
    Filed: June 28, 2019
    Publication date: October 24, 2019
    Inventors: Adam Charles Uzelac, Darren Behmlander, Michael Dana Chan, Thomas Doyle, Gregory Pendergrast, Kenneth Zaleski, Richard Dean Terpstra, Richard D. Moore, George McFalls
  • Patent number: 10454970
    Abstract: Disclosed is a method, a device, and/or a system of authorization of access to a data resource in addition to specific actions to be performed on the data resource based on an authorized context enforced by a use policy. A computer-implemented method includes receiving a use request from a device to use a protected resource. The method extracts from a security node a use policy comprising defining an authorized context for use the protected resource. First, access to the protected resource is authorized when the use request conforms to the authorized context. Use keys are generated and returned to the device for redemption. Second, after the protected resource is streamed to the device, a process of the device monitors use of and enforce ephemerality of the protected resource by maintaining an active use ledger. A use policy update may generate new use terms that are pushed to the device, terminating use.
    Type: Grant
    Filed: August 7, 2016
    Date of Patent: October 22, 2019
    Inventors: Dhryl Anton, Michael McFall
  • Publication number: 20190318103
    Abstract: Disclosed is a method, a device, and/or a system of initiation and transfer of a cryptographic database and/or a cryptographic unit. In one embodiment, an electronic mint generates and mints proofs in an indelible media using a hash function. The proofs and/or an origin hash based on the proofs may be usable to seed a hash chain of a cryptographic bearer database and/or a cryptographic unit with an evolving state hash. The database and/or unit is issued from a treasury server and transferred between user devices as coordinated by a tracking server that utilizes one or more immutable records to track the database and/or unit and retain uniqueness of the bearer database in its most evolved state. Transfers may update user state hash of an evolving user profile usable as an authentication token and/or to show assent to a transaction resulting in a seal hash of acceptance.
    Type: Application
    Filed: June 13, 2017
    Publication date: October 17, 2019
    Inventors: Dhryl Anton, Michael McFall
  • Patent number: 10396992
    Abstract: Disclosed is a method, a device, and/or a system of authentication of a user and/or a device through parallel synchronous update of immutable hash histories. In one embodiment, a computer-implemented method for authentication includes receiving an identity claim from a device that includes a device root hash of a hashed history of the device, referred to as a device hastory. Data of a user profile associated with the device that includes a profile root hash of a profile hastory is retrieved. The device root hash and the profile root hash are compared and determined to be identical to verify an identity of a user and/or a device. A transaction record is generated and deposited as a new block in both in the profile hastory and device hastory. A new profile root hash is computed to evolve the identity of the user profile for a prospective authentication request.
    Type: Grant
    Filed: August 7, 2016
    Date of Patent: August 27, 2019
    Inventors: Dhryl Anton, Michael McFall
  • Publication number: 20190251284
    Abstract: Disclosed is a method, a device, a system and/or a manufacture of efficient data query and utilization through a semantic storage model. In one embodiment, a method includes generating a unique identifier (UID) to uniquely address a domain within a datastore, defining a content element (NT element) storing a primitive data and/or drawing reference(s) to other domains within the datastore according to a directed acyclic graph architecture, an identity entity element (TY element) of the domain storing data that alone or in combination distinguishes the domain from one or more other domains within the datastore, and a context element (XT element) of the domain that further characterizes the domain and/or draws reference(s) to other domains within the datastore which may violate the directed acyclic graph architecture to define a flexible contextual reference. A key may be generated such that the TY element is individually addressable within the datastore.
    Type: Application
    Filed: April 24, 2019
    Publication date: August 15, 2019
    Applicant: VESCEL, LLC
    Inventors: Dhryl Anton, Michael McFall
  • Patent number: 10356094
    Abstract: Disclosed is a method, a device, and/or a system of uniqueness and auditing of a data resource through an immutable record of transactions in a hash history. In one embodiment, a method includes maintaining uniqueness of a “data organism” that has a hash history, referred to as a hastory, forming a unique identity based on previous transactions in which the data organism participated. The method may be usable to verify an original of the data organism, control copies, transfer ownership and/or audit the datastore. The hastory includes a set of blocks in a sequential chain, each block including a transaction record. A root hash is unique within the datastore for a given data within each block and a given block order of the sequential chain. A transaction record is deposited as a new block in the sequential and the root hash is re-calculated to evolve identity of the data organism.
    Type: Grant
    Filed: August 7, 2016
    Date of Patent: July 16, 2019
    Inventors: Dhryl Anton, Michael McFall
  • Patent number: 10341176
    Abstract: Implementations described and claimed herein provided for a system for provisioning network resources. The system includes a network provisioning abstraction layer having an application interface for receiving network provisioning requests from applications and determine provisioning instructions for fulfilling the requests. Each of the received provisioning instructions is queued in a priority queuing system according to a request priority. The provisioning instructions for the highest priority requests are removed from the front of the queue and sent to a resource interface that relays the requests to the appropriate network resources.
    Type: Grant
    Filed: March 5, 2018
    Date of Patent: July 2, 2019
    Assignee: Level 3 Communications, LLC
    Inventors: Adam Charles Uzelac, Darren Behmlander, Michael Dana Chan, Thomas Doyle, Gregory Pendergrast, Kenneth Zaleski, Richard Dean Terpstra, Richard D. Moore, George McFalls
  • Patent number: 10318753
    Abstract: Disclosed is a method, a device, a system and/or a manufacture of a semantic data structure. In one embodiment, a physical memory usable to store information within a datastore comprises a number of domains. Each domain includes a unique identifier and organizes data into a domain structure that includes and an identity element, a content element, and a context element, each of which may be implemented as an EAV triplet. A fundamental instantiation of the domain structure contains a primitive data and a relational instantiation of the domain structure contains references to other domains. The references of the content element may be constrained, for example to a directed acyclic graph architecture, while references of the context element may reference any domain. Additional instantiations may build orders of referential structure, provide security and control of data resources within the datastore, and model users and application programs.
    Type: Grant
    Filed: June 29, 2015
    Date of Patent: June 11, 2019
    Inventors: Dhryl Anton, Michael McFall
  • Publication number: 20180198826
    Abstract: Disclosed is a method, a device, and/or a system of control over data resource utilization through a security node control policy evaluated in the context of an authorization request. In one embodiment, a method includes receiving an authorization request from a device to utilize a protected resource within a datastore. A control policy extracted from a security node defines an authorized context for the device to utilize the protected resource. The control policy includes a control algorithm comprising one or more conditionals comparing context values to control ranges. Context values are retrieved to form a context dataset. Utilization of the protected resource is authorized when it is determined by the control algorithm that the context dataset conforms to the authorized context. The security node may organize data into a domain structure that includes a unique identifier, an identity element, a content element, and a context element.
    Type: Application
    Filed: March 6, 2018
    Publication date: July 12, 2018
    Inventors: DHRYL ANTON, Michael McFall
  • Patent number: 9948682
    Abstract: Disclosed is a method, a device, and/or a system of a data resource control data structure. In one embodiment, a computer-implemented method includes receiving an authorization request from a device to utilize a protected resource within a datastore. A control policy that defines an authorized context in which the device is authorized to utilize the protected resource is extracted from a security node of a non-hierarchical data structure. The control policy includes a control algorithm and optionally a control dataset. Context values specified in the control algorithm are retrieved to form a context dataset. Utilization of the protected resource is authorized when it is determined by the control algorithm that the context dataset conforms to the authorized context. The security node may organize data into a domain structure that includes a unique identifier, an identity element, a content element, and a context element.
    Type: Grant
    Filed: August 7, 2016
    Date of Patent: April 17, 2018
    Assignee: VESCEL, LLC
    Inventors: Dhryl Anton, Michael McFall
  • Publication number: 20170048253
    Abstract: Disclosed is a method, a device, and/or a system of a data resource control data structure. In one embodiment, a computer-implemented method includes receiving an authorization request from a device to utilize a protected resource within a datastore. A control policy that defines an authorized context in which the device is authorized to utilize the protected resource is extracted from a security node of a non-hierarchical data structure. The control policy includes a control algorithm and optionally a control dataset. Context values specified in the control algorithm are retrieved to form a context dataset. Utilization of the protected resource is authorized when it is determined by the control algorithm that the context dataset conforms to the authorized context. The security node may organize data into a domain structure that includes a unique identifier, an identity element, a content element, and a context element.
    Type: Application
    Filed: August 7, 2016
    Publication date: February 16, 2017
    Inventors: Dhryl Anton, Michael McFall
  • Publication number: 20170034217
    Abstract: Disclosed is a method, a device, and/or a system of authorization of access to a data resource in addition to specific actions to be performed on the data resource based on an authorized context enforced by a use policy. A computer-implemented method includes receiving a use request from a device to use a protected resource. The method extracts from a security node a use policy comprising defining an authorized context for use the protected resource. First, access to the protected resource is authorized when the use request conforms to the authorized context. Use keys are generated and returned to the device for redemption. Second, after the protected resource is streamed to the device, a process of the device monitors use of and enforce ephemerality of the protected resource by maintaining an active use ledger. A use policy update may generate new use terms that are pushed to the device, terminating use.
    Type: Application
    Filed: August 7, 2016
    Publication date: February 2, 2017
    Inventors: Dhryl Anton, Michael McFall
  • Publication number: 20160344550
    Abstract: Disclosed is a method, a device, and/or a system of authentication of a user and/or a device through parallel synchronous update of immutable hash histories. In one embodiment, a computer-implemented method for authentication includes receiving an identity claim from a device that includes a device root hash of a hashed history of the device, referred to as a device hastory. Data of a user profile associated with the device that includes a profile root hash of a profile hastory is retrieved. The device root hash and the profile root hash are compared and determined to be identical to verify an identity of a user and/or a device. A transaction record is generated and deposited as a new block in both in the profile hastory and device hastory. A new profile root hash is computed to evolve the identity of the user profile for a prospective authentication request.
    Type: Application
    Filed: August 7, 2016
    Publication date: November 24, 2016
    Inventors: Dhryl Anton, Michael McFall
  • Publication number: 20160344737
    Abstract: Disclosed is a method, a device, and/or a system of uniqueness and auditing of a data resource through an immutable record of transactions in a hash history. In one embodiment, a method includes maintaining uniqueness of a “data organism” that has a hash history, referred to as a hastory, forming a unique identity based on previous transactions in which the data organism participated. The method may be usable to verify an original of the data organism, control copies, transfer ownership and/or audit the datastore. The hastory includes a set of blocks in a sequential chain, each block including a transaction record. A root hash is unique within the datastore for a given data within each block and a given block order of the sequential chain. A transaction record is deposited as a new block in the sequential and the root hash is re-calculated to evolve identity of the data organism.
    Type: Application
    Filed: August 7, 2016
    Publication date: November 24, 2016
    Inventors: Dhryl Anton, Michael McFall
  • Publication number: 20160063100
    Abstract: Disclosed is a method, a device, a system and/or a manufacture of a semantic data structure. In one embodiment, a physical memory usable to store information within a datastore comprises a number of domains. Each domain includes a unique identifier and organizes data into a domain structure that includes and an identity element, a content element, and a context element, each of which may be implemented as an EAV triplet. A fundamental instantiation of the domain structure contains a primitive data and a relational instantiation of the domain structure contains references to other domains. The references of the content element may be constrained, for example to a directed acyclic graph architecture, while references of the context element may reference any domain. Additional instantiations may build orders of referential structure, provide security and control of data resources within the datastore, and model users and application programs.
    Type: Application
    Filed: June 29, 2015
    Publication date: March 3, 2016
    Inventors: Dhryl Anton, Michael McFall
  • Publication number: 20120005070
    Abstract: The invention is directed to a system for and a method of generating sales leads as a service for one or more vehicle dealerships that are not otherwise affiliated with the service.
    Type: Application
    Filed: July 1, 2010
    Publication date: January 5, 2012
    Applicant: Veretech Holdings, Inc.
    Inventors: Michael McFALL, Arthur DeLaurier, Dianne DeLaurier, Thomas Cross, Lou Loquasto
  • Patent number: 5468205
    Abstract: An exercise apparatus is disclosed having a pair of pulley support units mounted on a door by straps which vertically encircle the door. The support units are interconnected by a series of elastic bands, such as bungee cords that run vertical paths between the support units. The ends of the bands or cords are wrapped around pulleys and terminated such that a handle may be attached to each of the cords at either the top unit or the bottom unit. Various exercises are possible with one or two arms or legs by pulling on the cords with the handle. The apparatus is easily mounted or dismounted from any door or other vertically oriented and fixed-in-place partition and is small enough to fold and store in a small carrying case.
    Type: Grant
    Filed: November 2, 1994
    Date of Patent: November 21, 1995
    Inventors: Michael McFall, Paul Aagaard