Patents by Inventor Scott Renfro

Scott Renfro has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190080063
    Abstract: The present disclosure relates to techniques for processing personally identifiable information (PII). The techniques may include accessing a log data storage that stores log data, wherein the log data is structured into multiple dimensions; isolating a partition of the log data in the log data storage, wherein the partition is associated with one dimension of the multiple dimensions and is associated with a first characterization of presence or absence of PII in the partition; processing, using a machine-learning (ML) based classifier and based on a model, the partition to generate a second characterization of presence or absence of PII in the partition; comparing the first characterization against the second characterization; and based on a result of the comparison, performing one or more actions.
    Type: Application
    Filed: September 13, 2017
    Publication date: March 14, 2019
    Inventors: Derrick Francis Rice, Scott Renfro
  • Publication number: 20090187978
    Abstract: A system and method for providing access to a secured data resource to a client on a peer-to-peer network. The system includes a content management server which receives and verifies a first request for access to a secured data resource from the client. If the first request is valid, the content management server generates a second request for access to the secured data resource which comprises peer-to-peer control information and information identifying the secured data resource, and which can additionally include a signature generated using a shared key. The content management transmits the second request to the client, which then retransmits the second request to a peer-to-peer control server. The control server receives the second request and validates it. Such validations can include validating the request with the shared key. If the second request is valid, the control server transmits instructions for accessing the secured data resource back to the client.
    Type: Application
    Filed: January 18, 2008
    Publication date: July 23, 2009
    Applicant: Yahoo! Inc.
    Inventors: Manish Upendran, Scott Renfro, Saurabh Tewari, Bhargavaram B. Gade, Satish Menon, Tanvi Vyas