Patents by Inventor Peter V. Radatti

Peter V. Radatti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7389540
    Abstract: The present invention comprises apparatus and methods for processing code, that is, for intercepting, examining and/or controlling code streams in a network. A protocol parser is implemented in order to intercept the code as it passes through the channel and transfer the code to a proscribed code scanner. Embodiments for various platforms, including Unix® and Windows® NT are disclosed.
    Type: Grant
    Filed: March 6, 2001
    Date of Patent: June 17, 2008
    Assignee: CyberSoft, Inc.
    Inventors: Peter V. Radatti, Timothy R. Eliseo
  • Patent number: 7370795
    Abstract: Methods and apparatus are shown for providing information on a pill. A patient specific delivery apparatus for medicine using information on a pill or pills is shown as well, and a database with patient specific information may be provided, resulting in an individualized pharmacopoeia for a patient.
    Type: Grant
    Filed: April 12, 2005
    Date of Patent: May 13, 2008
    Assignee: Cybersoft, Inc.
    Inventors: Marie D. Radatti, Peter V. Radatti
  • Patent number: 7373643
    Abstract: The present invention comprises apparatus, methods and articles of manufacture for transferring data, comprising one or more update files made available upon distribution media, such as a server, a hash of the update files made available upon the server, as well as versions of the update and hash files upon a target or client. The distribution media then transmits the hash to the target or client, the hashes are compared, and, if they do not match, the update files are downloaded for further review and updating, if desired. If updating is desired, an update mechanism will then edit and/or replace files, modules, data and/or byte sequences on the target, according to the preferred embodiments. Embodiments for various platforms, including Unix® and Windows® NT are disclosed.
    Type: Grant
    Filed: March 6, 2001
    Date of Patent: May 13, 2008
    Assignee: CyberSoft, Inc.
    Inventor: Peter V. Radatti
  • Patent number: 7143113
    Abstract: Apparatus, methods, and articles of manufacture are claimed for securing, maintaining, monitoring and controlling computer files. Various predetermined files are hashed on the machine, providing a first data file with the file names and hash values, which data file is stored as a baseline. At desired intervals, a comparison cycle begins. A second data file is provided comprised of desired file names, which are then taken one at a time, hashed, and compared to the baseline first data file. Results are recorded as desired.
    Type: Grant
    Filed: December 21, 2001
    Date of Patent: November 28, 2006
    Assignee: CyberSoft, Inc.
    Inventor: Peter V. Radatti
  • Patent number: 7093135
    Abstract: The present invention is a system and method for identifying and securing code, as well as providing virus detection and code authentication. This detection and authentication occurs through modules or components which utilize certification identifiers to authenticate and validate code. Preferred embodiments include macro detection.
    Type: Grant
    Filed: May 11, 2000
    Date of Patent: August 15, 2006
    Assignee: CyberSoft, Inc.
    Inventors: Peter V. Radatti, Joseph W. Wells
  • Publication number: 20040230840
    Abstract: A computer system and method for intercepting, examining, and controlling data streams flowing via transport connections between the transport layer of an operating system and the user application. All data streams that pass from an external network, through the transport layer of an operating system to the user application or from the user application to the transport layer are intercepted by a network traffic interceptor. The network traffic interceptor processes all data streams for proscribed data that may include viruses, trojan horses, worms, and other hostile algorithms. The processing used by the network traffic interceptor can include monitoring, blocking or destroying data, thereby protecting the single computer system from being infected by hostile algorithms.
    Type: Application
    Filed: June 4, 2004
    Publication date: November 18, 2004
    Inventor: Peter V. Radatti
  • Publication number: 20040210769
    Abstract: The present invention comprises apparatus, methods and articles of manufacture for computer virus testing in a networked environment. A host is provided that permits uploading of suspected files by a user. The are transferred to a server, where they are scanned for the presence of known virii. The files are then run, in an appropriate operating environment, separate from the operating system of the server, and the results compared to and noted against a reference. Any modified files are logged, as is any output. The user is notified as to the results, and in some embodiments, the lists of modified files are made available to various users.
    Type: Application
    Filed: April 17, 2003
    Publication date: October 21, 2004
    Applicant: CyberSoft, Inc.
    Inventors: Peter V. Radatti, Richard J. Perry
  • Publication number: 20040199773
    Abstract: Apparatus, methods and articles of manufacture are disclosed for intercepting, examining and controlling proscribed or predetermined code, data and files and their transfers. A preprocessing component, code decomposition component, valuation component and comparison component are used to process code. The methods of valuation used include numerical valuation so as to obtain a numerical value for the code. Additional features may include a decryption feature, code alteration component and other components.
    Type: Application
    Filed: April 26, 2004
    Publication date: October 7, 2004
    Inventors: Peter V. Radatti, Richard J. Perry, Gary L. Blawat
  • Publication number: 20040199594
    Abstract: Apparatus, methods, and articles of manufacture are claimed for processing code comprising the preprocessing of code, transferring of the code from a storage area to a transfer component, decomposing the code, valuing the code, and comparing the code to a threshold value. The processing indicates the presence or absence of proscribed code, which may be spam, virii, confidential material, harassing material, etc. and so the code may be redirected. The especially preferred embodiments operate within a UNIX sendmail environment.
    Type: Application
    Filed: April 26, 2004
    Publication date: October 7, 2004
    Inventors: Peter V. Radatti, Richard J. Perry
  • Publication number: 20040199508
    Abstract: Apparatus, methods and articles of manufacture for file integrity and baseline maintenance on a computer system or systems are shown. A file integrity check is made of files on a system by hashing the files and comparing the hash to a stored hash of the files. If the comparison is false, the system requests a copy of the file from a server, which may be unknown or untrusted. The system then compares the received file to the stored hash. If the comparison is true, the copy of the file will be installed on the system. If false, the system repeats the request.
    Type: Application
    Filed: April 1, 2003
    Publication date: October 7, 2004
    Applicant: CyberSoft, Inc.
    Inventor: Peter V. Radatti
  • Publication number: 20040143763
    Abstract: The present invention comprises apparatus and methods for processing instant messaging or peer-to-peer code, that is, for intercepting, examining and/or controlling instant messaging and/or peer-to-peer code in a network. A protocol parser is implemented in order to intercept the code as it passes through the channel and transfer the code to a proscribed code scanner. “Man in the middle” technology may be used as well through decryptor/encryptor components placed between client and server which permit examination of the code by a proscribed code scanner as it passes through a communications channel. Embodiments for various platforms, including Unix® and Windows® NT are disclosed.
    Type: Application
    Filed: April 6, 2004
    Publication date: July 22, 2004
    Inventor: Peter V. Radatti
  • Patent number: 6763467
    Abstract: A computer system and method for intercepting, examining, and controlling data streams flowing via transport connections between the transport layer of an operating system and the user application; which operates on a single computer. The system and method preferably operates with a single computer system. All data streams that pass from an external network, through the transport layer of an operating system to the user application or from the user application to the transport layer are intercepted by a network traffic interceptor. The network traffic interceptor processes all data streams for proscribed data that may include viruses, trojan horses, worms, and other hostile algorithms. The processing used by the network traffic interceptor can include monitoring, blocking or destroying data, thereby protecting the single computer system from being infected by hostile algorithms.
    Type: Grant
    Filed: February 3, 1999
    Date of Patent: July 13, 2004
    Assignee: CyberSoft, Inc.
    Inventors: Peter V. Radatti, David J. Harding
  • Patent number: 6721424
    Abstract: A method for intercepting data transmissions in a system which is comprised of an external network and computers within a protected local network. A proxy server located in the communication path, between the external network and the computers, is equipped with virus detection capability and includes, also, key storage means and a hostage storage facility. If the proxy server determines that an incoming transmission from the external network contains hostile data, a key is obtained from the key storage means so as to decrypt the transmission. If no such key is available, the proxy server prevents the data transmission from entering the protected network and stores the data transmission as “hostage data” within the hostage storage facility until the intended user provides the proxy server with a key capable of decrypting the hostage data transmission.
    Type: Grant
    Filed: August 19, 1999
    Date of Patent: April 13, 2004
    Assignee: CyberSoft, Inc
    Inventor: Peter V. Radatti
  • Publication number: 20030140049
    Abstract: Apparatus, methods, and articles of manufacture are claimed for securing, maintaining, monitoring and controlling computer files. Various predetermined files are hashed on the machine, providing a first data file with the file names and hash values, which data file is stored as a baseline. At desired intervals, a comparison cycle begins. A second data file is provided comprised of desired file names, which are then taken one at a time, hashed, and compared to the baseline first data file. Results are recorded as desired.
    Type: Application
    Filed: December 21, 2001
    Publication date: July 24, 2003
    Applicant: CyberSoft, Inc.
    Inventor: Peter V. Radatti
  • Publication number: 20030120953
    Abstract: Apparatus, methods, and articles of manufacture are claimed for securing, maintaining, monitoring and controlling computer networks and clients located therein by use of client hash code tables, which are stored on a server. Clients subsequently provide client state codes which are compared to the hash code tables to ensure only acceptable client modifications have taken place. In the event of unacceptable client modifications, mechanisms are used to notify appropriate resources.
    Type: Application
    Filed: December 21, 2001
    Publication date: June 26, 2003
    Applicant: CyberSoft, Inc
    Inventor: Peter V. Radatti
  • Publication number: 20020170052
    Abstract: The present invention comprises apparatus, methods and articles of manufacture for transferring data, comprising one or more update files made available upon distribution media, such as a server, a hash of the update files made available upon the server, as well as versions of the update and hash files upon a target or client. The distribution media then transmits the hash to the target or client, the hashes are compared, and, if they do not match, the update files are downloaded for further review and updating, if desired. If updating is desired, an update mechanism will then edit and/or replace files, modules, data and/or byte sequences on the target, according to the preferred embodiments. Embodiments for various platforms, including Unix® and Windows® NT are disclosed.
    Type: Application
    Filed: March 6, 2001
    Publication date: November 14, 2002
    Inventor: Peter V. Radatti
  • Publication number: 20020157008
    Abstract: Software virus detection methods, apparatus and articles of manufacture are shown. In the preferred embodiments, these comprise review of proscribed code by an evaluative interpreter, which interprets the code in order to review the code for the presence of disguised viral or other code. The interpreted result is then first scanned for the presence of file open, or file modify or other instructions of interest, as well as scanned again for the presence of viral code signatures. The results are reported as desired.
    Type: Application
    Filed: April 19, 2001
    Publication date: October 24, 2002
    Applicant: CyberSoft, Inc.
    Inventor: Peter V. Radatti
  • Publication number: 20020129237
    Abstract: The present invention comprises apparatus and methods for processing code, that is, for intercepting, examining and/or controlling code streams in a network. “Man in the middle” technology by use of decryptor/encryptor components are placed between client and server which permit alteration of the code as it passes through a communications channel. The code may then be examined by way of a proscribed code scanner. A protocol parser may also be implemented in order to intercept the code as it passes through the stack and transfer the code to the decryptor/encryptor components.
    Type: Application
    Filed: March 6, 2001
    Publication date: September 12, 2002
    Inventors: Peter V. Radatti, Timothy R. Eliseo
  • Publication number: 20010042214
    Abstract: The present invention comprises apparatus and methods for processing code, that is, for intercepting, examining and/or controlling code streams in a network. A protocol parser is implemented in order to intercept the code as it passes through the channel and transfer the code to a proscribed code scanner. Embodiments for various platforms, including Unix® and Windows® NT are disclosed.
    Type: Application
    Filed: March 6, 2001
    Publication date: November 15, 2001
    Inventors: Peter V. Radatti, Timothy R. Eliseo