Patents by Inventor Robert G. Caffary
Robert G. Caffary has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210014210Abstract: The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.Type: ApplicationFiled: February 12, 2020Publication date: January 14, 2021Inventor: Robert G. Caffary, JR.
-
Publication number: 20190327221Abstract: The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.Type: ApplicationFiled: November 5, 2018Publication date: October 24, 2019Inventor: Robert G. Caffary, JR.
-
Publication number: 20190109857Abstract: The technology described in this document can be embodied in a method that includes receiving information about an electronic file stored on a primary cloud drive of a user, and receiving one or more user-defined attributes associated with the electronic file. The one or more user-defined attributes are indicative of a home network associated with the electronic file. The method also includes generating, based on the one or more user-defined attributes, a security token that is configured to control access to the electronic file based on whether the access is from within or outside of the home network, and storing a copy of the electronic file on a secondary cloud drive separate from the primary cloud drive, wherein the copy of the electronic file is stored on the secondary cloud drive in association with the security token.Type: ApplicationFiled: March 23, 2017Publication date: April 11, 2019Applicant: Document Dynamics, LLCInventor: Robert G. Caffary, Jr.
-
Patent number: 10122696Abstract: The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.Type: GrantFiled: March 6, 2017Date of Patent: November 6, 2018Assignee: Document Dynamics, LLCInventor: Robert G. Caffary, Jr.
-
Publication number: 20180026956Abstract: The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.Type: ApplicationFiled: March 6, 2017Publication date: January 25, 2018Inventor: Robert G. Caffary, JR.
-
Patent number: 9608980Abstract: The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.Type: GrantFiled: August 15, 2016Date of Patent: March 28, 2017Assignee: Document Dynamics, LLCInventor: Robert G. Caffary, Jr.
-
Patent number: 9590971Abstract: The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.Type: GrantFiled: August 15, 2016Date of Patent: March 7, 2017Assignee: Document Dynamics, LLCInventor: Robert G. Caffary, Jr.
-
Publication number: 20160352718Abstract: The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.Type: ApplicationFiled: August 15, 2016Publication date: December 1, 2016Inventor: Robert G. Caffary, JR.
-
Publication number: 20160352741Abstract: The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.Type: ApplicationFiled: August 15, 2016Publication date: December 1, 2016Inventor: Robert G. Caffary, JR.
-
Patent number: 9449187Abstract: The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.Type: GrantFiled: August 11, 2014Date of Patent: September 20, 2016Assignee: Document Dynamics, LLCInventor: Robert G. Caffary, Jr.
-
Publication number: 20160044040Abstract: The technology described in this document can be embodied in a computer implemented method that includes receiving, at a processing device, information about one or more assets associated with a network of devices. The method also includes generating, for at least one of the assets, a security token that is based at least on a portion of the received information about the corresponding asset. The security token can be configured to identify a home network defined for the asset, and to restrict access to the corresponding asset upon detecting an occurrence of an unauthorized activity involving the asset. The method further includes storing, in a storage device, information about the security token and information linking the security token to the corresponding asset, and initiating integration of the security token with the corresponding asset.Type: ApplicationFiled: August 11, 2014Publication date: February 11, 2016Inventor: Robert G. Caffary, JR.
-
Patent number: 7872772Abstract: A software system and method for monitoring and tracking print transaction event history for a pipeline users, devices, applications and documents in a network environment. The system employs a substitute print driver that comprises the original OEM Print Driver installed at each client or server PC, and at each target output device, wrapped with installed “agent” software. This agent software combined with the original OEM print driver performs the following functions: 1) monitors document origination, generation, acquisition and destination metrics to and from the network pipeline of User(s) and Device(s) connected to the print server; 2) sends data to a data store which the customer and/or dealer controls, and 3) provides content management functionality of document delivery.Type: GrantFiled: March 12, 2007Date of Patent: January 18, 2011Inventor: Robert G. Caffary, Jr.
-
Patent number: 7190478Abstract: A system of hardware, software and a business method that enables printer and copier vendors to outsource network printing. The method is implemented on a local area network including a server PC, a plurality of connected client PCs, and a plurality of printers each networked through a secure network connection device that communicates only with Secure Print Servers. The business method comprises the steps of running Assessment Software over a test interval to determine a customer's printer cost per page, making an outsourcing proposal to the customer based on the customer's printer cost per page and a predetermined rationalization of printer layout, conducting a network survey to determine the customer's network characteristics, and installing print job tracking software on secure print servers attached to the customer's network. The print job tracking software captures all print traffic and automatically sends print job data to a secure web-site database for review by Dealers and Customers.Type: GrantFiled: May 29, 2002Date of Patent: March 13, 2007Inventors: Robert G. Caffary, Jr., Thomas J. Love, Paul F. James
-
Publication number: 20030223092Abstract: A system of hardware, software and a business method that enables printer and copier vendors to outsource network printing. The method is implemented on a local area network including a server PC, a plurality of connected client PCs, and a plurality of printers each networked through a secure network connection device that communicates only with Secure Print Servers. The business method comprises the steps of running Assessment Software over a test interval to determine a customer's printer cost per page, making an outsourcing proposal to the customer based on the customer's printer cost per page and a predetermined rationalization of printer layout, conducting a network survey to determine the customer's network characteristics, and installing print job tracking software on secure print servers attached to the customer's network. The print job tracking software captures all print traffic and automatically sends print job data to a secure web-site database for review by Dealers and Customers.Type: ApplicationFiled: May 29, 2002Publication date: December 4, 2003Inventors: Robert G. Caffary, Thomas J. Love, Paul F. James