Patents by Inventor Ryan Speers
Ryan Speers has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11973860Abstract: Systems and methods for initiating an action based on electronic activities of a user. Generally, a computing device receives a policy for enabling cryptographically secure tracking of electronic activities of a user and a particular electronic computing device. The policy can include definitions for a multiple actions to be taken with respect to certain electronic activities resulting from interaction by the user with the at least one computing device. The computing device can identify a particular electronic activity resulting from user interaction with the at least one computing device. The computing device can determine a particular action to take by applying the policy to the particular electronic activity. The computing device can initiate the particular action with respect to the particular electronic activity.Type: GrantFiled: June 24, 2022Date of Patent: April 30, 2024Assignee: lonic Security Inc.Inventors: Adam Ghetti, Jeffrey Howard, James Jordan, Nicholas Smith, Jeremy Eckman, Ryan Speers, Sohaib Bhatti
-
Patent number: 11841959Abstract: Systems and methods for permitting software presence/configurations to function as a factor in a multi-factor authentication scheme so that a user's access to a different software program/application is conditioned on the presence of certain pre-specified software or software configurations that would otherwise not be necessary for access and/or operation of the different software program/application. Generally, by confirming the presence/configuration of the pre-specified software on a computing device, the system ensures that a user, in one embodiment, may only access the different software program/application with the proper configuration of the pre-specified software.Type: GrantFiled: November 18, 2021Date of Patent: December 12, 2023Assignee: Ionic Security Inc.Inventors: Adam Ghetti, Ryan Speers, Jeffrey Howard, Robert McColl, Taylor Jay Centers, William Monte LeBlanc
-
Patent number: 11822680Abstract: Systems and methods for intercepting an operation requested by a user (e.g., print a document, cut text, copy an image, paste a hyperlink, embed an audio clip, save as a document in a new location, etc.) and performing one or more actions based on the level of security associated with the originating program, originating file, intended program, and/or intended file for that operation. As such, the disclosed systems and methods may enable consistent data security to be applied to a particular data item regardless of the location of that data item or the operations performed on the same.Type: GrantFiled: March 26, 2019Date of Patent: November 21, 2023Assignee: IONIC SECURITY INC.Inventors: Ryan Speers, Adam Ghetti, Farzon Lotfi, David Askew, Kent Rollins
-
Patent number: 11387986Abstract: Systems and methods are discussed for performing multi-key cryptographic operations. Policies can be received that define whether to perform a cryptographic operation with respect to various data items generated by one or more computing devices. The data items can be identified and compared to the policies to determine whether to perform the cryptographic operation on subsets of data items. The cryptographic operation can be performed with respect to a first subset of the data items using a first key, while the cryptographic operation can be performed with respect to a second subset of the data items using a second key.Type: GrantFiled: January 13, 2020Date of Patent: July 12, 2022Assignee: Ionic Security Inc.Inventors: Adam Ghetti, Jeffrey Howard, James Jordan, Nicholas Smith, Jeremy Eckman, Ryan Speers, Sohaib Bhatti
-
Patent number: 11210412Abstract: Systems and methods for permitting software presence/configurations to function as a factor in a multi-factor authentication scheme so that a user's access to a different software program/application is conditioned on the presence of certain pre-specified software or software configurations that would otherwise not be necessary for access and/or operation of the different software program/application. Generally, by confirming the presence/configuration of the pre-specified software on a computing device, the system ensures that a user, in one embodiment, may only access the different software program/application with the proper configuration of the pre-specified software.Type: GrantFiled: February 1, 2018Date of Patent: December 28, 2021Assignee: Ionic Security Inc.Inventors: Adam Ghetti, Ryan Speers, Jeffrey Howard, Robert McColl, Taylor Jay Centers, William Monte LeBlanc
-
Patent number: 11138275Abstract: Systems and methods are disclosed for, without access to the original set of data elements from which the online filter was originally constructed, converting online filters to other types of filters. To convert a particular type of online filter to either an offline filter or a different type of online filter, the system, in various embodiments, first determines the types/formats of each of the relevant filters. Then, in various embodiments, the system extracts the appropriate data representations from the original online filter. In various embodiments, the system converts the extracted data representations into the data representation format of the new filter. The system, in various embodiments, then constructs the new filter from the converted data representations.Type: GrantFiled: May 7, 2018Date of Patent: October 5, 2021Assignee: Ionic Security Inc.Inventors: Jonathan Thomas Burns, Ryan Speers
-
Patent number: 10567167Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.Type: GrantFiled: July 9, 2018Date of Patent: February 18, 2020Assignee: IONIC SECURITY INC.Inventors: Adam Ghetti, Jeffrey Howard, James Jordan, Nicholas Smith, Jeremy Eckman, Ryan Speers, Sohaib Bhatti
-
Patent number: 10270592Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.Type: GrantFiled: March 27, 2017Date of Patent: April 23, 2019Assignee: Ionic Security Inc.Inventors: Adam Ghetti, Ken Green, Kenneth Silva, Michael Rollins, Nathaniel Tinkler, Jeremy Eckman, Ryan Speers
-
Patent number: 10020935Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.Type: GrantFiled: March 27, 2017Date of Patent: July 10, 2018Assignee: Ionic Security Inc.Inventors: Adam Ghetti, Jeffrey Howard, James Jordan, Nicholas Smith, Jeremy Eckman, Ryan Speers, Sohaib Bhatti
-
Patent number: 10020936Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.Type: GrantFiled: April 3, 2017Date of Patent: July 10, 2018Assignee: Ionic Security Inc.Inventors: Adam Ghetti, James Jordan, Kenneth Silva, Jeremy Eckman, Robert McColl, Ryan Speers
-
Patent number: 9786170Abstract: Embodiments are disclosed for scheduling and presenting notifications, via an in-vehicle computing system, to a driver of a vehicle. In some embodiments, a method for an in-vehicle computing system includes receiving data regarding a notification for presentation to a driver of a vehicle. The method further includes, based on a driver profile, adjusting a timing of presenting the notification to the driver via the in-vehicle computing system, wherein the driver profile is generated based on past driving behavior associated with the driver.Type: GrantFiled: January 6, 2015Date of Patent: October 10, 2017Assignee: Harman International Industries, IncorporatedInventors: Tirtha Roy, William Taranowski, Ilya Pautov, Ryan Speer
-
Patent number: 9614670Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.Type: GrantFiled: February 5, 2016Date of Patent: April 4, 2017Assignee: Ionic Security Inc.Inventors: Adam Ghetti, James Jordan, Kenneth Silva, Jeremy Eckman, Robert McColl, Ryan Speers
-
Patent number: 9608810Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.Type: GrantFiled: February 5, 2016Date of Patent: March 28, 2017Assignee: Ionic Security Inc.Inventors: Adam Ghetti, Ken Green, Kenneth Silva, Michael Rollins, Nathaniel Tinkler, Jeremy Eckman, Ryan Speers
-
Patent number: 9608809Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.Type: GrantFiled: February 5, 2016Date of Patent: March 28, 2017Assignee: Ionic Security Inc.Inventors: Adam Ghetti, Jeffrey Howard, James Jordan, Nicholas Smith, Jeremy Eckman, Ryan Speers, Sohaib Bhatti
-
Publication number: 20150191178Abstract: Embodiments are disclosed for a method for an in-vehicle computing system including detecting a request to perform a driver-dependent function, and inferring an identity of the driver based on current driving data/behavior relative to one or more driver profiles, each of the one or more driver profiles generated using driver-specific past driving data/behavior. The method may further include selectively enabling performance of the driver-dependent function of the in-vehicle computing system based on the inferred driver identity.Type: ApplicationFiled: January 6, 2015Publication date: July 9, 2015Inventors: Tirtha Roy, William Taranowski, Ilya Pautov, Ryan Speer
-
Publication number: 20150191122Abstract: Embodiments are disclosed for scheduling and presenting notifications, via an in-vehicle computing system, to a driver of a vehicle. In some embodiments, a method for an in-vehicle computing system includes receiving data regarding a notification for presentation to a driver of a vehicle. The method further includes, based on a driver profile, adjusting a timing of presenting the notification to the driver via the in-vehicle computing system, wherein the driver profile is generated based on past driving behavior associated with the driver.Type: ApplicationFiled: January 6, 2015Publication date: July 9, 2015Inventors: Tirtha Roy, William Taranowski, Ilya Pautov, Ryan Speer