Patents by Inventor Scott Hammersley
Scott Hammersley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240137614Abstract: A system for to monitor image input of a computing device having a control circuit with a programmable processor, and configured to receive images and to output the images to an image output device coupled to the computing device. The computing device can be configured to monitor the received images via the processor of the computing device being programmed using a Machine Learning Image Classification (MLIC) algorithm configured to determine a score of at least one received image within a predetermined criteria for classifying said at least one received image as a restricted subject image. Based on determination of the score, a modify or non-modify command is generated; and wherein in response to said at least one received image being scored by said processor within the modify criteria, the processor is programmed to generate a command to output the modified image.Type: ApplicationFiled: December 20, 2023Publication date: April 25, 2024Inventors: Michael HOLM, Matt RIBIERO, Scott HAMMERSLEY, Ronald DEHAAS
-
Patent number: 11856260Abstract: A system for to monitor image input of a computing device having a control circuit with a programmable processor, and configured to receive images and to output the images to an image output device coupled to the computing device. The computing device can be configured to monitor the received images via the processor of the computing device being programmed using a Machine Learning Image Classification (MLIC) algorithm configured to determine a score of at least one received image within a predetermined criteria for classifying said at least one received image as a restricted subject image. Based on determination of the score, a modify or non-modify command is generated; and wherein in response to said at least one received image being scored by said processor within the modify criteria, the processor is programmed to generate a command to output the modified image.Type: GrantFiled: March 30, 2017Date of Patent: December 26, 2023Assignee: COVENANT EYES, INC.Inventors: Michael Holm, Matt Ribiero, Scott Hammersley, Ronald Dehaas
-
Publication number: 20230114680Abstract: Some embodiments provide systems and methods to monitor network communications, comprising: a computing device comprising a control circuit and memory with instructions executed by the control circuit to implement: a tunneled monitoring service (TMS) operated local on the mobile computing device; and a tunnel protocol within the mobile computing device that is configured to establish a tunnel interface between software applications and the TMS, wherein the tunnel interface is configured, to collect output data transactions, communicated by the software applications, and direct the output data transactions to the TMS; wherein the TMS is configured to initiate a monitoring of each output data transaction relative to predefined criteria to identify relevant parameter information, obtained from one or more of the output data transactions, that have a predefined relationship with one or more of the criteria, and cause results of the monitoring relative to the criteria to be recorded.Type: ApplicationFiled: December 12, 2022Publication date: April 13, 2023Inventors: Jason KING, Jeffrey M. WOFFORD, Patrick SMITH, Scott HAMMERSLEY, Ronald DEHAAS
-
Patent number: 11528205Abstract: Some embodiments provide systems and methods to monitor network communications, comprising: a computing device comprising a control circuit and memory with instructions executed by the control circuit to implement: a tunneled monitoring service (TMS) operated local on the mobile computing device; and a tunnel protocol within the mobile computing device that is configured to establish a tunnel interface between software applications and the TMS, wherein the tunnel interface is configured to collect output data transactions, communicated by the software applications, and direct the output data transactions to the TMS; wherein the TMS is configured to initiate a monitoring of each output data transaction relative to predefined criteria to identify relevant parameter information, obtained from one or more of the output data transactions, that have a predefined relationship with one or more of the criteria, and cause results of the monitoring relative to the criteria to be recorded.Type: GrantFiled: June 12, 2018Date of Patent: December 13, 2022Assignee: COVENANT EYES, INC.Inventors: Jason King, Jeffrey M. Wofford, Patrick Smith, Scott Hammersley, Ronald Dehaas
-
Publication number: 20200302029Abstract: A system for to monitor image input of a computing device having a control circuit with a programmable processor, and configured to receive images and to output the images to an image output device coupled to the computing device. The computing device can be configured to monitor the received images via the processor of the computing device being programmed using a Machine Learning Image Classification (MLIC) algorithm configured to determine a score of at least one received image within a predetermined criteria for classifying said at least one received image as a restricted subject image. Based on determination of the score, a modify or non-modify command is generated; and wherein in response to said at least one received image being scored by said processor within the modify criteria, the processor is programmed to generate a command to output the modified image.Type: ApplicationFiled: March 30, 2017Publication date: September 24, 2020Applicant: Covenant Eyes, Inc.Inventors: Michael HOLM, Matt RIBIERO, Scott HAMMERSLEY, Ronald DEHAAS
-
Publication number: 20180295043Abstract: Some embodiments provide systems and methods to monitor network communications, comprising: a computing device comprising a control circuit and memory with instructions executed by the control circuit to implement: a tunneled monitoring service (TMS) operated local on the mobile computing device; and a tunnel protocol within the mobile computing device that is configured to establish a tunnel interface between software applications and the TMS, wherein the tunnel interface is configured to collect output data transactions, communicated by the software applications, and direct the output data transactions to the TMS; wherein the TMS is configured to initiate a monitoring of each output data transaction relative to predefined criteria to identify relevant parameter information, obtained from one or more of the output data transactions, that have a predefined relationship with one or more of the criteria, and cause results of the monitoring relative to the criteria to be recorded.Type: ApplicationFiled: June 12, 2018Publication date: October 11, 2018Inventors: Jason KING, Jeffrey M. WOFFORD, Patrick SMITH, Scott HAMMERSLEY, Ronald DEHAAS
-
Patent number: 10097436Abstract: Some embodiments provide systems and methods to monitor network communications, comprising: a computing device comprising a control circuit and memory with instructions executed by the control circuit to implement: a tunneled monitoring service (TMS) operated local on the mobile computing device; and a tunnel protocol within the mobile computing device that is configured to establish a tunnel interface between software applications and the TMS, wherein the tunnel interface is configured to collect output data transactions, communicated by the software applications, and direct the output data transactions to the TMS; wherein the TMS is configured to initiate a monitoring of each output data transaction relative to predefined criteria to identify relevant parameter information, obtained from one or more of the output data transactions, that have a predefined relationship with one or more of the criteria, and cause results of the monitoring relative to the criteria to be recorded.Type: GrantFiled: October 22, 2015Date of Patent: October 9, 2018Assignee: COVENANT EYES, INC.Inventors: Jason King, Jeffrey M. Wofford, Patrick Smith, Scott Hammersley, Ronald DeHaas
-
Publication number: 20160119211Abstract: Some embodiments provide systems and methods to monitor network communications, comprising: a computing device comprising a control circuit and memory with instructions executed by the control circuit to implement: a tunneled monitoring service (TMS) operated local on the mobile computing device; and a tunnel protocol within the mobile computing device that is configured to establish a tunnel interface between software applications and the TMS, wherein the tunnel interface is configured to collect output data transactions, communicated by the software applications, and direct the output data transactions to the TMS; wherein the TMS is configured to initiate a monitoring of each output data transaction relative to predefined criteria to identify relevant parameter information, obtained from one or more of the output data transactions, that have a predefined relationship with one or more of the criteria, and cause results of the monitoring relative to the criteria to be recorded.Type: ApplicationFiled: October 22, 2015Publication date: April 28, 2016Inventors: Jason King, Jeffrey M. Wofford, Patrick Smith, Scott Hammersley, Ronald DeHaas
-
Patent number: 6934853Abstract: Provided is a method, system, program, and data structures method, system, program, and data structures for configuring a client computer connected to a network, wherein a remote computer is capable of communicating with the client computer over the network. Sets of configuration parameters are stored in a non-volatile storage unit. The sets of configuration parameters instruct at least one program how to initialize operational parameters and load programs into the client computer memory during a power on. For each set of configuration parameters, a token is stored in the non-volatile storage unit indicating access rights to the set of configuration parameters. The token specifies whether management entities running on the remote computer and client computer can access the set of configuration parameters for that token.Type: GrantFiled: January 18, 2001Date of Patent: August 23, 2005Assignee: International Business Machines CorporationInventors: Thomas Dean Christopherson, Pernell James Dykes, Scott Hammersley, Harvey Gene Kiel, Christopher John Lankow, Raymond Francis Romon, Timothy James Slavin
-
Publication number: 20050108383Abstract: A system for monitoring Internet use of a selected computer user includes a remote server and a computer having a monitoring program voluntarily installed thereon by the user communicatively connected to the remote server. The monitoring program is configured to monitor various Internet access activity of the computer user and record the Internet access activity on the remote server. The Internet access activity includes access of at least one Internet protocol from the group consisting of newsgroups, file sharing programs, file transfer programs, chat rooms, peer to peer chats, and electronic mail activity. A method of using a monitoring system includes the steps of a computer user voluntarily installing a monitoring program on a selected computer, recording the Internet access activity, and providing the recorded information to a third party recipient. A report may be provided that includes a variety of information and may include a plurality of portions.Type: ApplicationFiled: November 4, 2003Publication date: May 19, 2005Inventors: Ronald DeHaas, Scott Hammersley, Collin Rose
-
Publication number: 20020095595Abstract: Provided is a method, system, program, and data structures method, system, program, and data structures for configuring a client computer connected to a network, wherein a remote computer is capable of communicating with the client computer over the network. Sets of configuration parameters are stored in a non-volatile storage unit. The sets of configuration parameters instruct at least one program how to initialize operational parameters and load programs into the client computer memory during a power on. For each set of configuration parameters, a token is stored in the non-volatile storage unit indicating access rights to the set of configuration parameters. The token specifies whether management entities running on the remote computer and client computer can access the set of configuration parameters for that token.Type: ApplicationFiled: January 18, 2001Publication date: July 18, 2002Inventors: Thomas Dean Christopherson, Pernell James Dykes, Scott Hammersley, Harvey Gene Kiel, Christopher John Lankow, Raymond Francis Romon, Timothy James Slavin