Patents by Inventor Richard A. Landsman
Richard A. Landsman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10606986Abstract: Systems and methods are disclosed for managing and protecting electronic content and applications. Applications, content, and/or users can be given credentials by one or more credentialing authorities upon satisfaction of a set of requirements. Rights management software/hardware is used to attach and detect these credentials, and to enforce rules that indicate how content and applications may be used if certain credentials are present or absent. In one embodiment an application may condition access to a piece of electronic content upon the content's possession of a credential from a first entity, while the content may condition access upon the application's possession of a credential from a second entity and/or the user's possession of a credential from a third entity. Use of credentials in this manner enables a wide variety of relatively complex and flexible control arrangements to be put in place and enforced with relatively simple rights management technology.Type: GrantFiled: March 9, 2018Date of Patent: March 31, 2020Assignee: Intertrust Technologies CorporationInventors: David P. Maher, James M. Rudd, Eric J. Swenson, Richard A. Landsman
-
Patent number: 10469471Abstract: A third-party can subscribe to one or more electronic message group lists without joining the group lists by creating a trust relationship between the subscriber and a group list member. In particular, the subscriber can send a trust indicator to the group member, who can then determine whether to accept the trust indicator for all or specific groups that are associated with the group member, as appropriate. In at least one embodiment, the group member can send a trust indicator acceptance message to the subscriber that identifies the group member, and any or all group lists associated with the group member. The subscriber can then receive messages directed to the trusted group member or group lists, and can send group messages to the group lists subject to a receive setting associated with the group lists or group members of the group lists.Type: GrantFiled: September 14, 2012Date of Patent: November 5, 2019Assignee: Facebook, Inc.Inventor: Richard A. Landsman
-
Patent number: 10402482Abstract: A method may include receiving an input at design time specifying an application to support and receiving an input describing an application user scenario to support. The method may also include determining all possible semantic components required to support the application user scenario and determining all possible properties for the semantic components. The method may also include determining all possible operations in the application necessary to achieve the application user scenario. The method may also include mapping each operation to the semantic components and each property for the semantic components.Type: GrantFiled: September 22, 2015Date of Patent: September 3, 2019Assignee: OX SOFTWARE GMBHInventors: Svante Urs Schubert, Richard Landsman
-
Publication number: 20190057196Abstract: Systems and methods are disclosed for managing and protecting electronic content and applications. Applications, content, and/or users can be given credentials by one or more credentialing authorities upon satisfaction of a set of requirements. Rights management software/hardware is used to attach and detect these credentials, and to enforce rules that indicate how content and applications may be used if certain credentials are present or absent. In one embodiment an application may condition access to a piece of electronic content upon the content's possession of a credential from a first entity, while the content may condition access upon the application's possession of a credential from a second entity and/or the user's possession of a credential from a third entity. Use of credentials in this manner enables a wide variety of relatively complex and flexible control arrangements to be put in place and enforced with relatively simple rights management technology.Type: ApplicationFiled: March 9, 2018Publication date: February 21, 2019Applicant: Intertrust Technologies CorporationInventors: David P. Maher, James M. RUDD, Eric J. SWENSON, Richard A. LANDSMAN
-
Patent number: 10002239Abstract: Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing software and hardware, and/or detection of invalid content flows. Encryption protects the secrecy of content while it is being transferred or stored. Watermark screening protects against the unauthorized use of content. Watermark screening is provided by invoking a filter module to examine content for the presence of a watermark before the content is delivered to output hardware or software. The filter module is operable to prevent delivery of the content to the output hardware or software if it detects a predefined protection mark. Invalid content processing software is detected by a monitoring mechanism that validates the software involved in processing protected electronic content.Type: GrantFiled: March 8, 2017Date of Patent: June 19, 2018Assignee: Intertrust Technologies CorporationInventors: Michael K. MacKay, W. Olin Sibert, Richard A. Landsman, Eric J. Swenson, William Hunt
-
Patent number: 9946851Abstract: Systems and methods are disclosed for managing and protecting electronic content and applications. Applications, content, and/or users can be given credentials by one or more credentialing authorities upon satisfaction of a set of requirements. Rights management software/hardware is used to attach and detect these credentials, and to enforce rules that indicate how content and applications may be used if certain credentials are present or absent. In one embodiment an application may condition access to a piece of electronic content upon the content's possession of a credential from a first entity, while the content may condition access upon the application's possession of a credential from a second entity and/or the user's possession of a credential from a third entity. Use of credentials in this manner enables a wide variety of relatively complex and flexible control arrangements to be put in place and enforced with relatively simple rights management technology.Type: GrantFiled: August 5, 2016Date of Patent: April 17, 2018Assignee: Intertrust Technologies CorporationInventors: David P. Maher, James M. Rudd, Eric J. Swenson, Richard A. Landsman
-
Publication number: 20170242988Abstract: Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing software and hardware, and/or detection of invalid content flows. Encryption protects the secrecy of content while it is being transferred or stored. Watermark screening protects against the unauthorized use of content. Watermark screening is provided by invoking a filter module to examine content for the presence of a watermark before the content is delivered to output hardware or software. The filter module is operable to prevent delivery of the content to the output hardware or software if it detects a predefined protection mark. Invalid content processing software is detected by a monitoring mechanism that validates the software involved in processing protected electronic content.Type: ApplicationFiled: March 8, 2017Publication date: August 24, 2017Inventors: Michael K. MacKay, W. Olin Sibert, Richard A. Landsman, Eric J. Swenson, William Hunt
-
Patent number: 9667583Abstract: Systems and methods for sorting electronic messages using attributes of senders or of sender addresses. An electronic messaging server sorts electronic messages using attributes associated with the senders or sender addresses of the electronic messages. The sender addresses and associated attributes are stored in an accept list. A sorting module uses the accept list to sort the electronic messages into various folders. The sorting module can also access other data sources, such as a contact list, to assist in sorting the electronic messages. The attributes can be determined independently of the user or can be set directly by the user. The attributes can also identify a status of a sender such as whether the sender is authorized, unauthorized, or unconfirmed.Type: GrantFiled: July 15, 2015Date of Patent: May 30, 2017Assignee: AOL Inc.Inventors: Phillip Y. Goldman, Richard A. Landsman
-
Patent number: 9641594Abstract: The present invention relates generally to client-server architectures for allowing generic upload and download functionality between a web application at a server and a client. One exemplary method includes sending a download/upload request to a web application at the server, where the download/upload request specifies at least one file to download/upload; receiving a transmission from the server; parsing the transmission to identify a download/upload command and an associated download/upload manifest, where the download/upload manifest includes executable code that, when executed on the client, will perform the download/upload of the at least one file.Type: GrantFiled: May 1, 2015Date of Patent: May 2, 2017Assignee: AOL Inc.Inventor: Richard A. Landsman
-
Patent number: 9594923Abstract: Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing software and hardware, and/or detection of invalid content flows. Encryption protects the secrecy of content while it is being transferred or stored. Watermark screening protects against the unauthorized use of content. Watermark screening is provided by invoking a filter module to examine content for the presence of a watermark before the content is delivered to output hardware or software. The filter module is operable to prevent delivery of the content to the output hardware or software if it detects a predefined protection mark. Invalid content processing software is detected by a monitoring mechanism that validates the software involved in processing protected electronic content.Type: GrantFiled: July 23, 2015Date of Patent: March 14, 2017Assignee: Intertrust Technologies CorporationInventors: Michael K. MacKay, W. Olin Sibert, Richard A. Landsman, Eric J. Swenson, William Hunt
-
Publication number: 20160342775Abstract: Systems and methods are disclosed for managing and protecting electronic content and applications. Applications, content, and/or users can be given credentials by one or more credentialing authorities upon satisfaction of a set of requirements. Rights management software/hardware is used to attach and detect these credentials, and to enforce rules that indicate how content and applications may be used if certain credentials are present or absent. In one embodiment an application may condition access to a piece of electronic content upon the content's possession of a credential from a first entity, while the content may condition access upon the application's possession of a credential from a second entity and/or the user's possession of a credential from a third entity. Use of credentials in this manner enables a wide variety of relatively complex and flexible control arrangements to be put in place and enforced with relatively simple rights management technology.Type: ApplicationFiled: August 5, 2016Publication date: November 24, 2016Inventors: David P. MAHER, James M. RUDD, Eric J. SWENSON, Richard A. LANDSMAN
-
Patent number: 9495685Abstract: Methods and systems are provided for dynamically generating and displaying a list of contacts. In accordance with one implementation, a method is provided that includes identifying one or more contacts having associated contact information. The one or more contacts may be associated with a user and identified across a plurality of information services or sources. The method further includes determining a subset of the one or more contacts and associated contact information based on a set of predefined criteria, generating a list of the subset of contacts and associated contact information, and displaying the generated list of contacts and associated contact information on the user interface.Type: GrantFiled: April 9, 2012Date of Patent: November 15, 2016Assignee: AOL Inc.Inventors: Richard A. Landsman, William G. Wetherell, David Gee Louie, Karl Andrew Dotter, Richard T. Kramer
-
Patent number: 9418210Abstract: Systems and methods are disclosed for managing and protecting electronic content and applications. Applications, content, and/or users can be given credentials by one or more credentialing authorities upon satisfaction of a set of requirements. Rights management software/hardware is used to attach and detect these credentials, and to enforce rules that indicate how content and applications may be used if certain credentials are present or absent. In one embodiment an application may condition access to a piece of electronic content upon the content's possession of a credential from a first entity, while the content may condition access upon the application's possession of a credential from a second entity and/or the user's possession of a credential from a third entity. Use of credentials in this manner enables a wide variety of relatively complex and flexible control arrangements to be put in place and enforced with relatively simple rights management technology.Type: GrantFiled: December 15, 2014Date of Patent: August 16, 2016Assignee: Intertrust Technologies CorporationInventors: David P. Maher, James M. Rudd, Eric J. Swenson, Richard A. Landsman
-
Publication number: 20160012028Abstract: A method may include receiving an input at design time specifying an application to support and receiving an input describing an application user scenario to support. The method may also include determining all possible semantic components required to support the application user scenario and determining all possible properties for the semantic components. The method may also include determining all possible operations in the application necessary to achieve the application user scenario. The method may also include mapping each operation to the semantic components and each property for the semantic components.Type: ApplicationFiled: September 22, 2015Publication date: January 14, 2016Inventors: Svante Urs SCHUBERT, Richard LANDSMAN
-
Publication number: 20150379298Abstract: Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing software and hardware, and/or detection of invalid content flows. Encryption protects the secrecy of content while it is being transferred or stored. Watermark screening protects against the unauthorized use of content. Watermark screening is provided by invoking a filter module to examine content for the presence of a watermark before the content is delivered to output hardware or software. The filter module is operable to prevent delivery of the content to the output hardware or software if it detects a predefined protection mark. Invalid content processing software is detected by a monitoring mechanism that validates the software involved in processing protected electronic content.Type: ApplicationFiled: July 23, 2015Publication date: December 31, 2015Inventors: Michael K. MacKay, W. Olin Sibert, Richard A. Landsman, Eric J. Swenson, William Hunt
-
Publication number: 20150319124Abstract: Systems and methods for sorting electronic messages using attributes of senders or of sender addresses. An electronic messaging server sorts electronic messages using attributes associated with the senders or sender addresses of the electronic messages. The sender addresses and associated attributes are stored in an accept list. A sorting module uses the accept list to sort the electronic messages into various folders. The sorting module can also access other data sources, such as a contact list, to assist in sorting the electronic messages. The attributes can be determined independently of the user or can be set directly by the user. The attributes can also identify a status of a sender such as whether the sender is authorized, unauthorized, or unconfirmed.Type: ApplicationFiled: July 15, 2015Publication date: November 5, 2015Inventors: Phillip Y. GOLDMAN, Richard A. Landsman
-
Publication number: 20150269359Abstract: Systems and methods are disclosed for managing and protecting electronic content and applications. Applications, content, and/or users can be given credentials by one or more credentialing authorities upon satisfaction of a set of requirements. Rights management software/hardware is used to attach and detect these credentials, and to enforce rules that indicate how content and applications may be used if certain credentials are present or absent. In one embodiment an application may condition access to a piece of electronic content upon the content's possession of a credential from a first entity, while the content may condition access upon the application's possession of a credential from a second entity and/or the user's possession of a credential from a third entity. Use of credentials in this manner enables a wide variety of relatively complex and flexible control arrangements to be put in place and enforced with relatively simple rights management technology.Type: ApplicationFiled: December 15, 2014Publication date: September 24, 2015Inventors: David P. MAHER, James M. RUDD, Eric J. SWENSON, Richard A. LANDSMAN
-
Publication number: 20150237112Abstract: The present invention relates generally to client-server architectures for allowing generic upload and download functionality between a web application at a server and a client. One exemplary method includes sending a download/upload request to a web application at the server, where the download/upload request specifies at least one file to download/upload; receiving a transmission from the server; parsing the transmission to identify a download/upload command and an associated download/upload manifest, where the download/upload manifest includes executable code that, when executed on the client, will perform the download/upload of the at least one file.Type: ApplicationFiled: May 1, 2015Publication date: August 20, 2015Inventor: Richard A. LANDSMAN
-
Patent number: 9100358Abstract: Systems and methods for sorting electronic messages using attributes of senders or of sender addresses. An electronic messaging server sorts electronic messages using attributes associated with the senders or sender addresses of the electronic messages. The sender addresses and associated attributes are stored in an accept list. A sorting module uses the accept list to sort the electronic messages into various folders. The sorting module can also access other data sources, such as a contact list, to assist in sorting the electronic messages. The attributes can be determined independently of the user or can be set directly by the user. The attributes can also identify a status of a sender such as whether the sender is authorized, unauthorized, or unconfirmed.Type: GrantFiled: October 31, 2013Date of Patent: August 4, 2015Assignee: AOL Inc.Inventors: Phillip Y. Goldman, Richard A. Landsman
-
Patent number: 9098682Abstract: Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing software and hardware, and/or detection of invalid content flows. Encryption protects the secrecy of content while it is being transferred or stored. Watermark screening protects against the unauthorized use of content. Watermark screening is provided by invoking a filter module to examine content for the presence of a watermark before the content is delivered to output hardware or software. The filter module is operable to prevent delivery of the content to the output hardware or software if it detects a predefined protection mark. Invalid content processing software is detected by a monitoring mechanism that validates the software involved in processing protected electronic content.Type: GrantFiled: August 12, 2013Date of Patent: August 4, 2015Assignee: Intertrust Technologies CorporationInventors: Michael K. MacKay, W. Olin Sibert, Richard A. Landsman, Eric J. Swenson, William Hunt