Patents by Inventor Robert G. Caffary

Robert G. Caffary has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210014210
    Abstract: The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.
    Type: Application
    Filed: February 12, 2020
    Publication date: January 14, 2021
    Inventor: Robert G. Caffary, JR.
  • Publication number: 20190327221
    Abstract: The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.
    Type: Application
    Filed: November 5, 2018
    Publication date: October 24, 2019
    Inventor: Robert G. Caffary, JR.
  • Publication number: 20190109857
    Abstract: The technology described in this document can be embodied in a method that includes receiving information about an electronic file stored on a primary cloud drive of a user, and receiving one or more user-defined attributes associated with the electronic file. The one or more user-defined attributes are indicative of a home network associated with the electronic file. The method also includes generating, based on the one or more user-defined attributes, a security token that is configured to control access to the electronic file based on whether the access is from within or outside of the home network, and storing a copy of the electronic file on a secondary cloud drive separate from the primary cloud drive, wherein the copy of the electronic file is stored on the secondary cloud drive in association with the security token.
    Type: Application
    Filed: March 23, 2017
    Publication date: April 11, 2019
    Applicant: Document Dynamics, LLC
    Inventor: Robert G. Caffary, Jr.
  • Patent number: 10122696
    Abstract: The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.
    Type: Grant
    Filed: March 6, 2017
    Date of Patent: November 6, 2018
    Assignee: Document Dynamics, LLC
    Inventor: Robert G. Caffary, Jr.
  • Publication number: 20180026956
    Abstract: The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.
    Type: Application
    Filed: March 6, 2017
    Publication date: January 25, 2018
    Inventor: Robert G. Caffary, JR.
  • Patent number: 9608980
    Abstract: The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.
    Type: Grant
    Filed: August 15, 2016
    Date of Patent: March 28, 2017
    Assignee: Document Dynamics, LLC
    Inventor: Robert G. Caffary, Jr.
  • Patent number: 9590971
    Abstract: The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.
    Type: Grant
    Filed: August 15, 2016
    Date of Patent: March 7, 2017
    Assignee: Document Dynamics, LLC
    Inventor: Robert G. Caffary, Jr.
  • Publication number: 20160352718
    Abstract: The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.
    Type: Application
    Filed: August 15, 2016
    Publication date: December 1, 2016
    Inventor: Robert G. Caffary, JR.
  • Publication number: 20160352741
    Abstract: The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.
    Type: Application
    Filed: August 15, 2016
    Publication date: December 1, 2016
    Inventor: Robert G. Caffary, JR.
  • Patent number: 9449187
    Abstract: The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.
    Type: Grant
    Filed: August 11, 2014
    Date of Patent: September 20, 2016
    Assignee: Document Dynamics, LLC
    Inventor: Robert G. Caffary, Jr.
  • Publication number: 20160044040
    Abstract: The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.
    Type: Application
    Filed: August 11, 2014
    Publication date: February 11, 2016
    Inventor: Robert G. Caffary, JR.
  • Patent number: 7872772
    Abstract: A software system and method for monitoring and tracking print transaction event history for a pipeline users, devices, applications and documents in a network environment. The system employs a substitute print driver that comprises the original OEM Print Driver installed at each client or server PC, and at each target output device, wrapped with installed “agent” software. This agent software combined with the original OEM print driver performs the following functions: 1) monitors document origination, generation, acquisition and destination metrics to and from the network pipeline of User(s) and Device(s) connected to the print server; 2) sends data to a data store which the customer and/or dealer controls, and 3) provides content management functionality of document delivery.
    Type: Grant
    Filed: March 12, 2007
    Date of Patent: January 18, 2011
    Inventor: Robert G. Caffary, Jr.
  • Patent number: 7190478
    Abstract: A system of hardware, software and a business method that enables printer and copier vendors to outsource network printing. The method is implemented on a local area network including a server PC, a plurality of connected client PCs, and a plurality of printers each networked through a secure network connection device that communicates only with Secure Print Servers. The business method comprises the steps of running Assessment Software over a test interval to determine a customer's printer cost per page, making an outsourcing proposal to the customer based on the customer's printer cost per page and a predetermined rationalization of printer layout, conducting a network survey to determine the customer's network characteristics, and installing print job tracking software on secure print servers attached to the customer's network. The print job tracking software captures all print traffic and automatically sends print job data to a secure web-site database for review by Dealers and Customers.
    Type: Grant
    Filed: May 29, 2002
    Date of Patent: March 13, 2007
    Inventors: Robert G. Caffary, Jr., Thomas J. Love, Paul F. James
  • Publication number: 20030223092
    Abstract: A system of hardware, software and a business method that enables printer and copier vendors to outsource network printing. The method is implemented on a local area network including a server PC, a plurality of connected client PCs, and a plurality of printers each networked through a secure network connection device that communicates only with Secure Print Servers. The business method comprises the steps of running Assessment Software over a test interval to determine a customer's printer cost per page, making an outsourcing proposal to the customer based on the customer's printer cost per page and a predetermined rationalization of printer layout, conducting a network survey to determine the customer's network characteristics, and installing print job tracking software on secure print servers attached to the customer's network. The print job tracking software captures all print traffic and automatically sends print job data to a secure web-site database for review by Dealers and Customers.
    Type: Application
    Filed: May 29, 2002
    Publication date: December 4, 2003
    Inventors: Robert G. Caffary, Thomas J. Love, Paul F. James