Patents by Inventor Ralph Scott Forsythe

Ralph Scott Forsythe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11683169
    Abstract: Systems and methods for managing keys in a computer memory are described. In some embodiments, location addresses are determined for two key elements. A periodic time interval that is based on a time duration for performing a transaction involving a distance between the key elements is determined. One key element may be stored at a location address and then relocated to another location address after the periodic time interval has passed. In some embodiments, areas the computer memory may remain static during relocation of the key element.
    Type: Grant
    Filed: June 7, 2021
    Date of Patent: June 20, 2023
    Assignee: EBAY INC.
    Inventors: Michael J. T. Chan, Derek Chamorro, Venkata Siva Vijayendra Bhamidipati, Glenn G. Lebumfacil, Ralph Scott Forsythe
  • Publication number: 20210297249
    Abstract: Systems and methods for managing keys in a computer memory are described. In some embodiments, location addresses are determined for two key elements. A periodic time interval that is based on a time duration for performing a transaction involving a distance between the key elements is determined. One key element may be stored at a location address and then relocated to another location address after the periodic time interval has passed. In some embodiments, areas the computer memory may remain static during relocation of the key element.
    Type: Application
    Filed: June 7, 2021
    Publication date: September 23, 2021
    Inventors: Michael J.T. Chan, Derek Chamorro, Venkata Siva Vijayendra Bhamidipati, Glenn G. Lebumfacil, Ralph Scott Forsythe
  • Patent number: 11070373
    Abstract: Methods, systems, and media for improving computer security and performance of security are disclosed. In one example, a computer security system comprises a key management monitor, and two key elements comprising a first key element and a second key element. The first key element is stored at a first location address within a computer memory and the second key element is stored at a second location address. The key management monitor is configured to determine or receive a time duration for performing a data dump of contents of the computer memory. In one example, the key management monitor is further configured to control a location of the first key element within the computer memory, wherein the location address of the first key element is changed within a time period that is less than the time duration for performing the data dump of contents of the computer memory.
    Type: Grant
    Filed: February 21, 2018
    Date of Patent: July 20, 2021
    Assignee: eBay Inc.
    Inventors: Michael J. T. Chan, Derek Chamorro, Venkata Siva Vijayendra Bhamidipati, Glenn G. Lebumfacil, Ralph Scott Forsythe
  • Publication number: 20200403809
    Abstract: Technologies are shown for authenticating service requests on a communication link established using a digital certificate owned by an entity, where permissions data is associated with the digital certificate. A service request is received from the entity through the communication link. Responsive to the service request, the permissions data associated with the digital certificate is obtained and the service request checked against the permissions data associated with the digital certificate. If the service request is permitted based on the permissions data, the service request is processed. If the service request is not permitted based on the permissions data, the service request is rejected. The permissions data can be stored on a blockchain with a blockchain address in the certificate, in a certificate authority for the certificate, or locally on a server receiving the service request.
    Type: Application
    Filed: June 24, 2019
    Publication date: December 24, 2020
    Inventors: Michael CHAN, Derek CHAMORRO, Venkata Siva Vijayendra BHAMIDIPATI, Arpit JAIN, Ralph Scott FORSYTHE
  • Publication number: 20190260584
    Abstract: Methods, systems, and media for improving computer security and performance of security are disclosed. In one example, a computer security system comprises a key management monitor, and two key elements comprising a first key element and a second key element. The first key element is stored at a first location address within a computer memory and the second key element is stored at a second location address. The key management monitor is configured to determine or receive a time duration for performing a data dump of contents of the computer memory. In one example, the key management monitor is further configured to control a location of the first key element within the computer memory, wherein the location address of the first key element is changed within a time period that is less than the time duration for performing the data dump of contents of the computer memory.
    Type: Application
    Filed: February 21, 2018
    Publication date: August 22, 2019
    Inventors: Michael J.T. Chan, Derek Chamorro, Venkata Siva Vijayendra Bhamidipati, Glenn G. Lebumfacil, Ralph Scott Forsythe