Patents by Inventor Scott M. Petry
Scott M. Petry has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10542031Abstract: Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for providing a remote cloud browsing session. A remote cloud browsing session may receive a request for Internet content from a user device, access the Internet content from an Internet content source, and transmit second Internet content to the user device based on the requested Internet content.Type: GrantFiled: November 5, 2018Date of Patent: January 21, 2020Assignee: Authentic8, Inc.Inventors: Scott M. Petry, Ramesh Rajagopal, Peter K. Lund, Fredric L. Cox, Adam P. Moore, Leslie L. Dunston
-
Publication number: 20190075130Abstract: Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for providing a remote cloud browsing session. A remote cloud browsing session may receive a request for Internet content from a user device, access the Internet content from an Internet content source, and transmit second Internet content to the user device based on the requested Internet content.Type: ApplicationFiled: November 5, 2018Publication date: March 7, 2019Inventors: Scott M. Petry, Ramesh Rajagopal, Peter K. Lund, Fredric L. Cox, Adam P. Moore, Leslie L. Dunston
-
Publication number: 20180332080Abstract: Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for invocation of a secure web container which may display data representative of a requesting party's application at a user's machine. The secure web container is invoked upon receipt of an API call from the requesting party. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable web container), insulating the user and requesting parties from the threats associated with being online for the purposes of providing secure, policy-based interaction with a requesting party's online services.Type: ApplicationFiled: July 16, 2018Publication date: November 15, 2018Inventors: Ramesh Rajagopal, Scott M. Petry, James K. Tosh, Peter K. Lund, Fredric L. Cox, Adam P. Moore
-
Publication number: 20180324206Abstract: Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for securely and anonymously accessing web resources and customizable attribution of identity. In accordance with the present disclosure, a user may inspect and analyze a webpage as well as the underlying source code from an “arm's length” using a secure analysis application to prevent exposure on the user's local machine. The secure analysis application may provide increased flexibility in masking and/or modifying the user's digital persona to external websites. Additionally, the secure analysis application may be integrated with a translation service to translate textual web content without the web content provider being alerted that a translation is taking place.Type: ApplicationFiled: July 16, 2018Publication date: November 8, 2018Inventors: Scott M. PETRY, Ramesh RAJAGOPAL, Peter K. LUND, Fredric L. COX, Adam P. MOORE, Leslie L. DUNSTON, Varley H. TAYLOR, Zachary L. SEGAL, Luka I. STOLYAROV, Joshua R. MCMAINS, Brian T. ZAUGG
-
Publication number: 20180324145Abstract: Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for securely and anonymously accessing web resources and customizable attribution of identity. In accordance with the present disclosure, a user may inspect and analyze a webpage as well as the underlying source code from an “arm's length” using a secure analysis application to prevent exposure on the user's local machine. The secure analysis application may provide increased flexibility in masking and/or modifying the user's digital persona to external websites. Additionally, the secure analysis application may be integrated with a translation service to translate textual web content without the web content provider being alerted that a translation is taking place.Type: ApplicationFiled: July 16, 2018Publication date: November 8, 2018Inventors: Scott M. PETRY, Ramesh RAJAGOPAL, Peter K. LUND, Fredric L. COX, Adam P. MOORE, Leslie L. DUNSTON, Varley H. TAYLOR, Zachary L. SEGAL, Luka I. STOLYAROV, Joshua R. MCMAINS, Brian T. ZAUGG
-
Patent number: 10027625Abstract: Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for securely and anonymously accessing web resources and customizable attribution of identity. In accordance with the present disclosure, a user may inspect and analyze a webpage as well as the underlying source code from an “arm's length” using a secure analysis application to prevent exposure on the user's local machine. The secure analysis application may provide increased flexibility in masking and/or modifying the user's digital persona to external websites. Additionally, the secure analysis application may be integrated with a translation service to translate textual web content without the web content provider being alerted that a translation is taking place.Type: GrantFiled: October 9, 2017Date of Patent: July 17, 2018Assignee: Authentic8, Inc.Inventors: Scott M. Petry, Ramesh Rajagopal, Peter K. Lund, Fredric L. Cox, Adam P. Moore, Leslie L. Dunston, Varley H. Taylor, Zachary L. Segal, Luka I. Stolyarov, Joshua R. McMains, Brian T. Zaugg
-
Patent number: 10027700Abstract: Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for securely and anonymously accessing web resources and customizable attribution of identity. In accordance with the present disclosure, a user may inspect and analyze a webpage as well as the underlying source code from an “arm's length” using a secure analysis application to prevent exposure on the user's local machine. The secure analysis application may provide increased flexibility in masking and/or modifying the user's digital persona to external websites. Additionally, the secure analysis application may be integrated with a translation service to translate textual web content without the web content provider being alerted that a translation is taking place.Type: GrantFiled: March 9, 2017Date of Patent: July 17, 2018Assignee: Authentic8, Inc.Inventors: Scott M. Petry, Ramesh Rajagopal, Peter K. Lund, Fredric L. Cox, Adam P. Moore, Leslie L. Dunston, Varley H. Taylor, Zachary L. Segal, Luka I. Stolyarov, Joshua R. McMains, Brian T. Zaugg
-
Patent number: 10027714Abstract: Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for invocation of a secure web container which may display data representative of a requesting party's application at a user's machine. The secure web container is invoked upon receipt of an API call from the requesting party. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable web container), insulating the user and requesting parties from the threats associated with being online for the purposes of providing secure, policy-based interaction with a requesting party's online services.Type: GrantFiled: January 21, 2016Date of Patent: July 17, 2018Assignee: Authentic8, Inc.Inventors: Ramesh Rajagopal, Scott M. Petry, James K. Tosh, Peter K. Lund, Fredric L. Cox, Adam P. Moore
-
Publication number: 20180034773Abstract: Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for securely and anonymously accessing web resources and customizable attribution of identity. In accordance with the present disclosure, a user may inspect and analyze a webpage as well as the underlying source code from an “arm's length” using a secure analysis application to prevent exposure on the user's local machine. The secure analysis application may provide increased flexibility in masking and/or modifying the user's digital persona to external websites. Additionally, the secure analysis application may be integrated with a translation service to translate textual web content without the web content provider being alerted that a translation is taking place.Type: ApplicationFiled: October 9, 2017Publication date: February 1, 2018Inventors: Scott M. PETRY, Ramesh RAJAGOPAL, Peter K. LUND, Fredric L. COX, Adam P. MOORE, Leslie L. DUNSTON, Varley H. TAYLOR, Zachary L. SEGAL, Luka I. STOLYAROV, Joshua R. MCMAINS, Brian T. ZAUGG
-
Patent number: 9787637Abstract: Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for securely and anonymously accessing web resources and customizable attribution of identity. In accordance with the present disclosure, a user may inspect and analyze a webpage as well as the underlying source code from an “arm's length” using a secure analysis application to prevent exposure on the user's local machine. The secure analysis application may provide increased flexibility in masking and/or modifying the user's digital persona to external websites. Additionally, the secure analysis application may be integrated with a translation service to translate textual web content without the web content provider being alerted that a translation is taking place.Type: GrantFiled: December 30, 2016Date of Patent: October 10, 2017Assignee: Authentic8, Inc.Inventors: Scott M. Petry, Ramesh Rajagopal, Peter K. Lund, Fredric L. Cox, Adam P. Moore, Leslie L. Dunston, Varley H. Taylor, Zachary L. Segal, Luka I. Stolyarov, Joshua R. McMains, Brian T. Zaugg
-
Publication number: 20170180413Abstract: Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for securely and anonymously accessing web resources and customizable attribution of identity. In accordance with the present disclosure, a user may inspect and analyze a webpage as well as the underlying source code from an “arm's length” using a secure analysis application to prevent exposure on the user's local machine. The secure analysis application may provide increased flexibility in masking and/or modifying the user's digital persona to external websites. Additionally, the secure analysis application may be integrated with a translation service to translate textual web content without the web content provider being alerted that a translation is taking place.Type: ApplicationFiled: March 9, 2017Publication date: June 22, 2017Inventors: Scott M. PETRY, Ramesh RAJAGOPAL, Peter K. LUND, Fredric L. COX, Adam P. MOORE, Leslie L. DUNSTON, Varley H. TAYLOR, Zachary L. SEGAL, Luka I. STOLYAROV, Joshua R. MCMAINS, Brian T. ZAUGG
-
Publication number: 20170111318Abstract: Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for securely and anonymously accessing web resources and customizable attribution of identity. In accordance with the present disclosure, a user may inspect and analyze a webpage as well as the underlying source code from an “arm's length” using a secure analysis application to prevent exposure on the user's local machine. The secure analysis application may provide increased flexibility in masking and/or modifying the user's digital persona to external websites. Additionally, the secure analysis application may be integrated with a translation service to translate textual web content without the web content provider being alerted that a translation is taking place.Type: ApplicationFiled: December 30, 2016Publication date: April 20, 2017Inventors: Scott M. PETRY, Ramesh RAJAGOPAL, Peter K. LUND, Fredric L. COX, Adam P. MOORE, Leslie L. DUNSTON, Varley H. TAYLOR, Zachary L. SEGAL, Luka I. STOLYAROV, Joshua R. MCMAINS, Brian T. ZAUGG
-
Patent number: 9537873Abstract: Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for securely and anonymously accessing web resources and customizable attribution of identity. In accordance with the present disclosure, a user may inspect and analyze a webpage as well as the underlying source code from an “arm's length” using a secure analysis application to prevent exposure on the user's local machine. The secure analysis application may provide increased flexibility in masking and/or modifying the user's digital persona to external websites. Additionally, the secure analysis application may be integrated with a translation service to translate textual web content without the web content provider being alerted that a translation is taking place.Type: GrantFiled: February 20, 2016Date of Patent: January 3, 2017Assignee: Authentic8, Inc.Inventors: Scott M. Petry, Ramesh Rajagopal, Peter K. Lund, Fredric L. Cox, Adam P. Moore, Leslie L. Dunston, Varley H. Taylor, Zachary L. Segal, Luka I. Stolyarov, Joshua R. McMains, Brian T. Zaugg
-
Publication number: 20160248785Abstract: Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for securely and anonymously accessing web resources and customizable attribution of identity. In accordance with the present disclosure, a user may inspect and analyze a webpage as well as the underlying source code from an “arm's length” using a secure analysis application to prevent exposure on the user's local machine. The secure analysis application may provide increased flexibility in masking and/or modifying the user's digital persona to external websites. Additionally, the secure analysis application may be integrated with a translation service to translate textual web content without the web content provider being alerted that a translation is taking place.Type: ApplicationFiled: February 20, 2016Publication date: August 25, 2016Inventors: Scott M. Petry, Ramesh Rajagopal, Peter K. Lund, Fredric L. Cox, Adam P. Moore, Leslie L. Dunston, Varley H. Taylor, Zachary L. Segal, Luka I. Stolyarov, Joshua R. McMains, Brian T. Zaugg
-
Publication number: 20160156666Abstract: Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for invocation of a secure web container which may display data representative of a requesting party's application at a user's machine. The secure web container is invoked upon receipt of an API call from the requesting party. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable web container), insulating the user and requesting parties from the threats associated with being online for the purposes of providing secure, policy-based interaction with a requesting party's online services.Type: ApplicationFiled: January 21, 2016Publication date: June 2, 2016Inventors: Ramesh Rajagopal, Scott M. Petry, James K. Tosh, Peter K. Lund, Fredric L. Cox, Adam P. Moore
-
Patent number: 9246904Abstract: Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for invocation of a secure web container which may display data representative of a requesting party's application at a user's machine. The secure web container is invoked upon receipt of an API call from the requesting party. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable web container), insulating the user and requesting parties from the threats associated with being online for the purposes of providing secure, policy-based interaction with a requesting party's online services.Type: GrantFiled: November 3, 2014Date of Patent: January 26, 2016Assignee: Authentic8, Inc.Inventors: Ramesh Rajagopal, Scott M. Petry, James K. Tosh, Peter K. Lund, Fredric L. Cox, Adam P. Moore
-
Publication number: 20150058923Abstract: Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for invocation of a secure web container which may display data representative of a requesting party's application at a user's machine. The secure web container is invoked upon receipt of an API call from the requesting party. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable web container), insulating the user and requesting parties from the threats associated with being online for the purposes of providing secure, policy-based interaction with a requesting party's online services.Type: ApplicationFiled: November 3, 2014Publication date: February 26, 2015Inventors: Ramesh Rajagopal, Scott M. Petry, James K. Tosh, Peter K. Lund, Fredric L. Cox, Adam P. Moore
-
Patent number: 8881227Abstract: Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for invocation of a secure web container which may display data representative of a requesting party's application at a user's machine. The secure web container is invoked upon receipt of an API call from the requesting party. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable web container), insulating the user and requesting parties from the threats associated with being online for the purposes of providing secure, policy-based interaction with a requesting party's online services.Type: GrantFiled: March 15, 2013Date of Patent: November 4, 2014Assignee: Authentic8, Inc.Inventors: Ramesh Rajagopal, Scott M. Petry, James K. Tosh, Jr., Peter K. Lund, Fredric L. Cox, Adam P. Moore
-
Patent number: 8769020Abstract: The present invention provides an electronic message management system (EMS) that includes a real-time feedback loop where data is collected from the electronic messages on incoming connection attempts, outgoing delivery attempts, and message content analysis, and written to a centralized data matrix. A separate process accesses the data matrix and analyzes trends in that data. The detected data patterns, trends or behavior is based on configuration parameters for the recipient. Based on these determinations, the process is able to instruct components in the EMS to accept, redirect, refuse, modify, defer, or otherwise dispose of the connection request, the delivery attempt, or the message. Associated methods for managing the transmission of electronic messages are also disclosed.Type: GrantFiled: April 26, 2005Date of Patent: July 1, 2014Assignee: Google, Inc.Inventors: Scott M. Petry, Shinya Akamine, Peter K. Lund, Fredric L. Cox, Michael J. Oswall
-
Patent number: 8725889Abstract: The present invention provides an electronic message management system (EMS) that includes a real-time feedback loop where data is collected from the electronic messages on incoming connection attempts, outgoing delivery attempts, and message content analysis, and written to a centralized data matrix. A separate process accesses the data matrix and analyzes trends in that data. The detected data patterns, trends or behavior is based on configuration parameters for the recipient. Based on these determinations, the process is able to instruct components in the EMS to accept, redirect, refuse, modify, defer, or otherwise dispose of the connection request, the delivery attempt, or the message. Associated methods for managing the transmission of electronic messages are also disclosed.Type: GrantFiled: March 1, 2007Date of Patent: May 13, 2014Assignee: Google Inc.Inventors: Scott M. Petry, Shinya Akamine, Peter Kevin Lund, Fred Cox, Michael John Oswall