Patents by Inventor Shelia Jean Burgess

Shelia Jean Burgess has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11200302
    Abstract: Autonomous embedded data cognition enables data to perform real-time environmental configuration control, self-manage, perform analyses, determine its current situation, and evaluate behavior to respond accordingly. When created, security measures, and access controls are selected. Highly sensitive data can be extracted and substituted with creator label and/or functional representation. Data-to-data reasoning and analysis can be performed. The processing method comprises autonomous monitoring for a state change and analyzing the current user to determine if the instantiation should exist. If affirmed, the cognition engine automatically configures the computational environment in which it resides. If denied, environmental behavior is further analyzed for security problems or an erroneous situation. If detected, the creator is alerted and provided with incident information enabling remote creator control of the data. Cognitive data can decide to self-destruct mitigating risk of undesirable instantiations.
    Type: Grant
    Filed: May 19, 2015
    Date of Patent: December 14, 2021
    Assignee: Azos AI, LLC
    Inventors: Shelia Jean Burgess, George G. Burgess, IV
  • Publication number: 20150254442
    Abstract: Autonomous embedded data cognition enables data to perform real-time environmental configuration control, self-manage, perform analyses, determine its current situation, and evaluate behavior to respond accordingly. When created, security measures, and access controls are selected. Highly sensitive data can be extracted and substituted with creator label and/or functional representation. Data-to-data reasoning and analysis can be performed. The processing method comprises autonomous monitoring for a state change and analyzing the current user to determine if the instantiation should exist. If affirmed, the cognition engine automatically configures the computational environment in which it resides. If denied, environmental behavior is further analyzed for security problems or an erroneous situation. If detected, the creator is alerted and provided with incident information enabling remote creator control of the data. Cognitive data can decide to self-destruct mitigating risk of undesirable instantiations.
    Type: Application
    Filed: May 19, 2015
    Publication date: September 10, 2015
    Inventors: Shelia Jean Burgess, George G. Burgess, IV
  • Publication number: 20140201526
    Abstract: A system, method, and apparatus for securing a date file or a cognitive encryption key data file stored in a storage medium or memory device. The date file or encryption key file having stored instructions for an embedded autonomous executable program which is executed each time there is an attempt to access, control, or manipulate the encryption key file includes querying a user of the date file or encryption key file, the user environment of the date file or encryption key file, or both, for information required for analyzing a computational environment in relation to required security parameters for the cognitive date file or encryption key file. The information in relation to the security parameters is received and analyzed. The computational environment of the user is determined and analyzed in relation to the required security parameters. Access to and/or use of the date file or encryption key file is either permitted or denied based on the analysis of the user and computational environment.
    Type: Application
    Filed: March 17, 2014
    Publication date: July 17, 2014
    Inventor: Shelia Jean Burgess
  • Publication number: 20130133026
    Abstract: Aspects of the inventive subject matter relate in general to systems, methods, and apparatus for data cognition that incorporates autonomous security protection and embedded intelligence. More particularly, the inventive subject matter relates to systems, methods, and apparatus utilizing cognitive data, cognitive encryption key(s), and cognitive data structures or protocols that can perform analyses and assessments, self-manage and/or self-organize, secure its environment, evaluate behavior, detect security problems, adapt, work in conjunction with network communication and protocols, alert the data creator of an urgent situation (Situation Awareness), and provide traceability, electronic forensics, and possess self-knowledge so it can be discovered, searched, and support data management, dynamic endpoint security, and be influenced by user behavior.
    Type: Application
    Filed: December 13, 2012
    Publication date: May 23, 2013
    Inventor: Shelia Jean Burgess
  • Publication number: 20120167164
    Abstract: A system, method, and apparatus for securing a cognitive encryption key data file stored in a storage medium or memory device. The encryption key file having stored instructions for an embedded autonomous executable program which is executed each time there is an attempt to access, control, or manipulate the encryption key file includes querying a user of the encryption key file, the user environment of the encryption key file, or both, for information required for analyzing a computational environment in relation to required security parameters for the cognitive encryption key file. The information in relation to the security parameters is received and analyzed. The computational environment of the user is determined and analyzed in relation to the required security parameters. Access to and/or use of the encryption key file is either permitted or denied based on the analysis of the user and computational environment.
    Type: Application
    Filed: December 13, 2011
    Publication date: June 28, 2012
    Applicant: AZOS AI, LLC
    Inventors: Shelia Jean BURGESS, George G. BURGESS, IV
  • Publication number: 20120163560
    Abstract: A communications controller and protocol are provided for empowering the user of a communications device, such as a telephone or mobile device, to assume intelligent control of communications. The communications controller provides conditional processing of incoming communication from a plurality of conditions comprising at least an emergency condition and a normal condition. Each caller is identified by unique originating source criteria associated with an incoming communication type. The user of the device may select to block a caller based on identification and the conditional type of the communication. The user also selects if the device is put into a unique mode where only emergency communication can alert the user. While in this mode “normal” communication will not alert the user of the communications device. Sensor data such as location of the sending device may be provided to the receiving party.
    Type: Application
    Filed: December 19, 2011
    Publication date: June 28, 2012
    Applicant: Azos Al, LLC
    Inventor: Shelia Jean BURGESS
  • Publication number: 20120151553
    Abstract: A method, apparatus and computer readable medium for data cognition incorporating autonomous security protection including, a data file stored on a storage medium, and having stored instructions for an embedded autonomous executable program which is executed each time there is an attempt to access, control, or manipulate the file, a processor for executing the program, an output device for communicating to a user, where communication is based on the result of executing the program in relation to parameters required for the data file by a data file original creator, and an input device for receiving a response to the communication. The method, apparatus, and computer readable medium autonomously monitors for a state change and analyzes the current user to determine if an instantiation should exist. If affirmed, a cognition engine automatically configures a computational environment in which it resides. If denied, environmental behavior is further analyzed for security problems.
    Type: Application
    Filed: December 13, 2011
    Publication date: June 14, 2012
    Applicant: AZOS AI, LLC
    Inventors: Shelia Jean BURGESS, George G. BURGESS, IV
  • Publication number: 20090007227
    Abstract: Autonomous embedded data cognition enables data to perform real-time environmental configuration control, self-manage, perform analyses, determine its current situation, and evaluate behavior to respond accordingly. When created, security measures, and access controls are selected. Highly sensitive data can be extracted and substituted with creator label and/or functional representation. Data-to-data reasoning and analysis can be performed. The processing method comprises autonomous monitoring for a state change and analyzing the current user to determine if the instantiation should exist. If affirmed, the cognition engine automatically configures the computational environment in which it resides. If denied, environmental behavior is further analyzed for security problems or an erroneous situation. If detected, the creator is alerted and provided with incident information enabling remote creator control of the data. Cognitive data can decide to self-destruct mitigating risk of undesirable instantiations.
    Type: Application
    Filed: June 30, 2008
    Publication date: January 1, 2009
    Applicant: AZOS AI LLC
    Inventors: Shelia Jean BURGESS, George G. Burgess, IV
  • Publication number: 20080285727
    Abstract: A communications controller and protocol are provided for empowering the user of a communications device, such as a telephone or other device, to assume intelligent control of communications. The communications controller provides conditional processing of incoming communication from a plurality of conditions comprising at least an emergency condition and a normal condition. Each caller is identified by unique originating source criteria associated with an incoming communication type. The user of the device may select to block callers based on their identification and the conditional type of the communication. The user also selects if the device is put into a unique mode where only emergency communication can alert the user. While in this mode “normal” communication will not alert the user of the communications device. Sensor data such as location of the sending device may be provided to the receiving party.
    Type: Application
    Filed: May 16, 2007
    Publication date: November 20, 2008
    Inventor: Shelia Jean Burgess
  • Publication number: 20080139167
    Abstract: A communications controller is provided for empowering the user of a communications device, such as a telephone or other device, to assume control over incoming communications. Each originator of a communication is identified by unique identification information as information associated with an incoming communication. The user of a receiving communication device selects one of a plurality of different priority levels for a particular originator of a communication. The user also selects block time intervals for each priority to indicate times during which communication will not be passed to user's communications device or other appropriate action is to be taken. When that particular originator of a communication initiates a communication to the user, the user's communication controller determines the originator's identification information and recalls the priority and corresponding blocking time interval for that particular identity.
    Type: Application
    Filed: January 2, 2008
    Publication date: June 12, 2008
    Inventor: Shelia Jean Burgess
  • Publication number: 20020128033
    Abstract: A communications controller is provided for empowering the user of a communications device, such as a telephone or other device, to assume control over incoming communications. This communications controller is based on artificial intelligence and behavior modeling techniques. Each communication is identified by unique identification information associated with an incoming communication. The user selects one of a plurality of different priority rating levels for a particular communication. The user also selects or infers block time intervals for each priority to indicate times during which incoming communication is not desired. Dynamic communications control is achieved by also determining the mood of the user or mode of the device. Undesirable communications will be “blocked”.
    Type: Application
    Filed: January 24, 2002
    Publication date: September 12, 2002
    Inventor: Shelia Jean Burgess
  • Patent number: 6359970
    Abstract: A communications controller is provided for empowering the user of a communications device, such as a telephone or other device, to assume control over incoming communications. Each caller is identified by unique identification information as information associated with an incoming communication. The user selects one of a plurality of different priority levels for a particular caller. The user also selects block time intervals for each priority to indicate times during which calls will not be passed to user's communications device or other appropriate action is to be taken. When that particular caller places a call to the user, the user's communication controller determines the caller's identification information and recalls the priority and corresponding blocking time interval for that particular caller. The call is accordingly passed to the communication device or blocked.
    Type: Grant
    Filed: April 16, 1999
    Date of Patent: March 19, 2002
    Assignee: Maverick Consulting Services, Inc.
    Inventor: Shelia Jean Burgess