Patents by Inventor Pierre Mouallem

Pierre Mouallem has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11934544
    Abstract: Target data may be associated with a location requirement established by a data owner. A data access module may be used to attempt access to the target data. Location requirement and provenance metadata associated with the target data are obtained. The provenance metadata must be validated, and evidence only approved data access locations identified in the location requirement. A current location of a computing device attempting access to the target data must also meet the location requirement. The computing device is allowed to access the target data only in response to the current location and each location identified in the provenance metadata meeting the location requirement. The provenance metadata is updated to include a new record including the current data access location.
    Type: Grant
    Filed: March 17, 2022
    Date of Patent: March 19, 2024
    Inventors: Pierre Mouallem, William Laurence Jaeger, Scott A. Piper, Michael Gerard Demeter
  • Publication number: 20240048568
    Abstract: A method for threat intelligence in a peer group includes identifying, at a first node in a network, a potential security threat. The first node is one of a plurality of nodes in a peer group and each node in the peer group has a level of trust for each node in the peer group. The method includes receiving a security communication from one or more other nodes of the peer group. Each security communication indicates that the node of the peer group sending the security communication has identified a potential security threat similar to the potential security threat identified by the first node. The method includes taking a corrective action to neutralize the potential security threat in response to reaching a consensus with the other nodes of the peer group that sent a security communication regarding the identified potential security threats that are similar.
    Type: Application
    Filed: August 3, 2022
    Publication date: February 8, 2024
    Inventors: Pierre Mouallem, William Laurence Jaeger, Scott A. Piper, Michael Gerard Demeter
  • Publication number: 20230297701
    Abstract: Target data may be associated with a location requirement established by a data owner. A data access module may be used to attempt access to the target data. Location requirement and provenance metadata associated with the target data are obtained. The provenance metadata must be validated, and evidence only approved data access locations identified in the location requirement. A current location of a computing device attempting access to the target data must also meet the location requirement. The computing device is allowed to access the target data only in response to the current location and each location identified in the provenance metadata meeting the location requirement. The provenance metadata is updated to include a new record including the current data access location.
    Type: Application
    Filed: March 17, 2022
    Publication date: September 21, 2023
    Inventors: Pierre Mouallem, William Laurence Jaeger, Scott A. Piper, Michael Gerard Demeter
  • Publication number: 20230092455
    Abstract: Systems and methods for managing access to data based on a geographic location requirement are disclosed herein. According to an aspect, a system includes a first computing device comprising a data storage manager configured to manage access to stored data based on one or more predetermined rule(s) that specifies geographic location requirement(s) for permissible access to the stored data. The manager is also configured to receive, from a second computing device, a request to access the data. Further, the manager is configured to determine a geographic location of the second computing device, determine whether the geographic location of the second computing device meets the geographic location requirement(s), and permit or deny access to the stored data by the second computing device in response to determining that the geographic location of the second computing device meets the geographic location requirement(s).
    Type: Application
    Filed: September 21, 2021
    Publication date: March 23, 2023
    Inventors: Michael Demeter, III, William Jaeger, Pierre Mouallem, Scott Piper