Patents by Inventor Richard A. Stokes

Richard A. Stokes has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11934462
    Abstract: A method, system, and computer program product for identifying network appliances on a network which includes a processor configured to intercept network communications from one or more devices between a first network and a second network. The processor may store the information about each connection in a database, the information including a Client Id and a destination address. The processor may query the database for a list of all destination addresses which were attempted to be contacted for each Client Id and generate metadata for each Client Id. The processor may analyze each Client Id, the associated metadata for each Client Id, and the destination addresses associated with each Client Id using one or more rules in a device identification tree and assign a device label to each Client Id of the one or more devices.
    Type: Grant
    Filed: July 20, 2022
    Date of Patent: March 19, 2024
    Assignee: ACTION STREAMER
    Inventor: Richard Stokes
  • Patent number: 11785049
    Abstract: Exemplary embodiments provide for rate limiting access to data endpoints which includes a processor configured to monitor network traffic between one or more devices on a first network and a second network. The processor may receive a first data endpoint request from one of the one or more devices and compare the first data endpoint request to a ledger of one or more data endpoints. The ledger may have a rate limit associated with the one or more data endpoints which defines a threshold number of requests allowed for the one or more data endpoints. In response to the first data endpoint request matching one or more of the data endpoints on the ledger, the processor may block the first data endpoint request when the data endpoint request exceeds the threshold number of requests allowed for the matching data endpoint on the ledger.
    Type: Grant
    Filed: September 1, 2021
    Date of Patent: October 10, 2023
    Assignee: ACTION STREAMER, LLC
    Inventor: Richard Stokes
  • Patent number: 11700243
    Abstract: A method for asynchronous side channel cipher renegotiation includes: establishing, by a first computing device, a first communication channel and a second communication channel with a second computing device, where the first communication channel is an encrypted tunnel and packages exchanged using the encrypted tunnel are encrypted using a first cipher; receiving, by a receiver of the first computing device, a renegotiation request from the second computing device using the second communication channel, where the renegotiation request includes at least a password value and a relative time; generating, by a processor of the first computing device, a second cipher using at least an encryption protocol and the password value; receiving, by the receiver of the first computing device, a new encrypted packet from the second computing device using the first communication channel; and decrypting, by the processor of the first computing device, the new encrypted packet using the second cipher.
    Type: Grant
    Filed: July 30, 2021
    Date of Patent: July 11, 2023
    Assignee: ACTION STREAMER, LLC
    Inventor: Richard Stokes
  • Publication number: 20220350843
    Abstract: A method, system, and computer program product for identifying network appliances on a network which includes a processor configured to intercept network communications from one or more devices between a first network and a second network. The processor may store the information about each connection in a database, the information including a Client Id and a destination address. The processor may query the database for a list of all destination addresses which were attempted to be contacted for each Client Id and generate metadata for each Client Id. The processor may analyze each Client Id, the associated metadata for each Client Id, and the destination addresses associated with each Client Id using one or more rules in a device identification tree and assign a device label to each Client Id of the one or more devices.
    Type: Application
    Filed: July 20, 2022
    Publication date: November 3, 2022
    Inventor: Richard STOKES
  • Patent number: 11416557
    Abstract: A method, system, and computer program product for identifying network appliances on a network which includes a processor configured to intercept network communications from one or more devices on a first network in communication with a second network. The processor may store information about each communication in a database, the information including a Client Id and a destination address. The processor may query the database for a list of all destination addresses which were attempted to be contacted for each Client Id and generate metadata for each Client Id. The processor may analyze each Client Id, the associated metadata for each Client Id, and the destination addresses associated with each Client Id using one or more rules in a device identification tree and assign a device label to each Client Id of the one or more devices.
    Type: Grant
    Filed: August 26, 2020
    Date of Patent: August 16, 2022
    Assignee: ACTION STREAMER, LLC
    Inventor: Richard Stokes
  • Publication number: 20220067103
    Abstract: A method, system, and computer program product for identifying network appliances on a network which includes a processor configured to intercept network communications from one or more devices between a first network and a second network. The processor may store the information about each connection in a database, the information including a Client Id and a destination address. The processor may query the database for a list of all destination addresses which were attempted to be contacted for each Client Id and generate metadata for each Client Id. The processor may analyze each Client Id, the associated metadata for each Client Id, and the destination addresses associated with each Client Id using one or more rules in a device identification tree and assign a device label to each Client Id of the one or more devices.
    Type: Application
    Filed: August 26, 2020
    Publication date: March 3, 2022
    Applicant: WINSTON PRIVACY
    Inventor: Richard STOKES
  • Publication number: 20210400083
    Abstract: A method, system, and computer program product for privacy and security policy delivery which includes a processor configured to store one or more compatibility modules in a memory of a computing device. The one or more compatibility modules being a security policy defining a set of specific access rules for a destination endpoint. The processor may receive a user selection of one of the one or more compatibility modules. The user selection may be received from a user device on a first network. The processor may install the selected compatibility module on the computing device. The processor may receive a user request from the user device for the destination endpoint. The destination endpoint may be associated with one or more domains on a second network. The processor may analyze the one or more domains using the security policy of the selected compatibility module.
    Type: Application
    Filed: September 4, 2020
    Publication date: December 23, 2021
    Applicant: WINSTON PRIVACY
    Inventor: Richard STOKES
  • Publication number: 20210400085
    Abstract: Exemplary embodiments provide for rate limiting access to data endpoints which includes a processor configured to monitor network traffic between one or more devices on a first network and a second network. The processor may receive a first data endpoint request from one of the one or more devices and compare the first data endpoint request to a ledger of one or more data endpoints. The ledger may have a rate limit associated with the one or more data endpoints which defines a threshold number of requests allowed for the one or more data endpoints. In response to the first data endpoint request matching one or more of the data endpoints on the ledger, the processor may block the first data endpoint request when the data endpoint request exceeds the threshold number of requests allowed for the matching data endpoint on the ledger.
    Type: Application
    Filed: September 1, 2021
    Publication date: December 23, 2021
    Applicant: WINSTON PRIVACY
    Inventor: Richard STOKES
  • Publication number: 20210359983
    Abstract: A method for asynchronous side channel cipher renegotiation includes: establishing, by a first computing device, a first communication channel and a second communication channel with a second computing device, where the first communication channel is an encrypted tunnel and packages exchanged using the encrypted tunnel are encrypted using a first cipher; receiving, by a receiver of the first computing device, a renegotiation request from the second computing device using the second communication channel, where the renegotiation request includes at least a password value and a relative time; generating, by a processor of the first computing device, a second cipher using at least an encryption protocol and the password value; receiving, by the receiver of the first computing device, a new encrypted packet from the second computing device using the first communication channel; and decrypting, by the processor of the first computing device, the new encrypted packet using the second cipher.
    Type: Application
    Filed: July 30, 2021
    Publication date: November 18, 2021
    Applicant: WINSTON PRIVACY
    Inventor: Richard STOKES
  • Publication number: 20210136038
    Abstract: A method, system, and computer program product for filtering domain requests which includes a processor configured to detect an initiation of a browser application on a user device on a first network. The processor may transmit a polling request to a specified endpoint. The specified endpoint may be enforced by a network monitoring device on the first network. The processor may receive a payload including a unique network device identifier from the specified endpoint, The processor may generate, a user notification alerting the user they are connected to the network monitoring device. The processor may monitor browser communications between a user device on a first network and a second network. The processor may receive a domain request from the user device and filter the domain request.
    Type: Application
    Filed: September 4, 2020
    Publication date: May 6, 2021
    Applicant: WINSTON PRIVACY
    Inventor: Richard Stokes
  • Publication number: 20210126922
    Abstract: A method, system, and computer program product for rate limiting access to data endpoints which includes a processor configured to monitor network traffic between one or more devices on a first network and a second network. The processor may receive a first data endpoint request from one of the one or more devices and compare the first data endpoint request to a ledger of one or more data endpoints. The ledger may have a rate limit associated with the one or more data endpoints which defines a threshold number of requests allowed for the one or more data endpoints. In response to the first data endpoint request matching one or more of the data endpoints on the ledger, the processor may block the first data endpoint request if the data endpoint request exceeds the threshold number of requests allowed for the matching data endpoint on the ledger.
    Type: Application
    Filed: September 4, 2020
    Publication date: April 29, 2021
    Applicant: WINSTON PRIVACY
    Inventor: Richard Stokes
  • Publication number: 20210075777
    Abstract: A method for asynchronous side channel cipher renegotiation includes: establishing, by a first computing device, a first communication channel and a second communication channel with a second computing device, where the first communication channel is an encrypted tunnel and packages exchanged using the encrypted tunnel are encrypted using a first cipher; receiving, by a receiver of the first computing device, a renegotiation request from the second computing device using the second communication channel, where the renegotiation request includes at least a password value and a relative time; generating, by a processor of the first computing device, a second cipher using at least an encryption protocol and the password value; receiving, by the receiver of the first computing device, a new encrypted packet from the second computing device using the first communication channel; and decrypting, by the processor of the first computing device, the new encrypted packet using the second cipher.
    Type: Application
    Filed: September 6, 2019
    Publication date: March 11, 2021
    Applicant: WINSTON PRIVACY
    Inventor: Richard STOKES
  • Publication number: 20210075817
    Abstract: A method, system, and computer program product for rate limiting JavaScript functions which includes a processor configured to monitor network traffic between one or more devices on a first network and a second network. The processor may receive a data endpoint request from one of the one or more devices and a JavaScript function request from the data endpoint. The processor may compare the JavaScript function request to a ledger. The ledger may have a rate limit associated with one or more JavaScript functions for a plurality of data endpoints. The processor may compare the first data endpoint request to the rate limit associated with the matching data endpoint on the ledger The processor may determine the rate limit associated with the data endpoint for the JavaScript function request has been exceeded, log he JavaScript function request in the ledger, and block the JavaScript function request.
    Type: Application
    Filed: September 4, 2020
    Publication date: March 11, 2021
    Applicant: WINSTON PRIVACY
    Inventor: Richard Stokes
  • Patent number: 10764250
    Abstract: A method for uniquely identifying a network client or application based on a transport layer security (TLS) handshake includes: storing, in a computing device, a list of cipher suites and a list of supported curves; intercepting, by the computing device, a data packet transmitted to as part of the TLS handshake; filtering, by the computing device, cipher suites included in the list of cipher suites from the data packet; filtering, by the computing device, supported curves included in the list of supported curves from the data packet; building, by the computing device, a data string using data in the data packet remaining after filtering; generating, by the computing device, a signature value by hashing the data string; and identifying, by the computing device, a network client or application using the generated signature value.
    Type: Grant
    Filed: September 17, 2019
    Date of Patent: September 1, 2020
    Assignee: WINSTON PRIVACY
    Inventor: Richard Stokes
  • Patent number: 10749027
    Abstract: In one general aspect, an apparatus can include a semiconductor region, and a trench defined within the semiconductor region. The trench can have a depth aligned along a vertical axis and have a length aligned along a longitudinal axis orthogonal to the vertical axis. The trench can have a first portion of the length included in a termination region of the semiconductor region and can have a second portion of the length included in an active region of the semiconductor region.
    Type: Grant
    Filed: December 28, 2018
    Date of Patent: August 18, 2020
    Assignee: Fairchild Semiconductor Corporation
    Inventors: Joseph A. Yedinak, Richard Stokes, Jason Higgs, Fred Session
  • Publication number: 20200092258
    Abstract: A method for uniquely identifying a network client or application based on a transport layer security (TLS) handshake includes: storing, in a computing device, a list of cipher suites and a list of supported curves; intercepting, by the computing device, a data packet transmitted to as part of the TLS handshake; filtering, by the computing device, cipher suites included in the list of cipher suites from the data packet; filtering, by the computing device, supported curves included in the list of supported curves from the data packet; building, by the computing device, a data string using data in the data packet remaining after filtering; generating, by the computing device, a signature value by hashing the data string; and identifying, by the computing device, a network client or application using the generated signature value.
    Type: Application
    Filed: September 17, 2019
    Publication date: March 19, 2020
    Applicant: WINSTON PRIVACY
    Inventor: Richard STOKES
  • Publication number: 20190245078
    Abstract: In one general aspect, an apparatus can include a semiconductor region, and a trench defined within the semiconductor region. The trench can have a depth aligned along a vertical axis and have a length aligned along a longitudinal axis orthogonal to the vertical axis. The trench can have a first portion of the length included in a termination region of the semiconductor region and can have a second portion of the length included in an active region of the semiconductor region.
    Type: Application
    Filed: December 28, 2018
    Publication date: August 8, 2019
    Applicant: FAIRCHILD SEMICONDUCTOR CORPORATION
    Inventors: Joseph A. Yedinak, Richard Stokes, Jason Higgs, Fred Session
  • Patent number: 10125922
    Abstract: A tree mountable bracket for suspending a bucket therefrom. The tree mountable bucket bracket includes a V-shaped member with a first segment and a second segment extended from a vertex point forming an angle. The first segment has a first bar attached distally from the vertex point. The first bar has a first end and a second end, the first end and the second end each have a hole. The second segment has a brace attached distally from the vertex point. A cable is secured in the hole of the first end of the first bar. An extension arm is attached via a hinge to the V-shaped member at a point adjacent to the vertex point opposite of the first and the second segment. The extension arm has a chain slot on an end distal to the hinge. A pulley is attached to the extension arm adjacent to the chain slot.
    Type: Grant
    Filed: February 6, 2018
    Date of Patent: November 13, 2018
    Inventor: Richard Stokes
  • Publication number: 20180231178
    Abstract: A tree mountable bracket for suspending a bucket therefrom. The tree mountable bucket bracket includes a V-shaped member with a first segment and a second segment extended from a vertex point forming an angle. The first segment has a first bar attached distally from the vertex point. The first bar has a first end and a second end, the first end and the second end each have a hole. The second segment has a brace attached distally from the vertex point. A cable is secured in the hole of the first end of the first bar. An extension arm is attached via a hinge to the V-shaped member at a point adjacent to the vertex point opposite of the first and the second segment. The extension arm has a chain slot on an end distal to the hinge.
    Type: Application
    Filed: February 6, 2018
    Publication date: August 16, 2018
    Inventor: Richard Stokes
  • Patent number: 10012175
    Abstract: A thrust reverser torque box assembly for an aircraft engine is constructed with a torque tube having a cross section configuration tailored and conducive to carrying torsion and discrete major fittings at opposite ends of the torque tube that connect the torque tube and thrust reverser actuation and reacts loading due to reverse thrust operation to the aircraft engine fan case.
    Type: Grant
    Filed: May 30, 2014
    Date of Patent: July 3, 2018
    Assignee: The Boeing Company
    Inventors: Richard Stokes, Jr., Donald Powell, Robert Morrow