Patents by Inventor Shelia Jean Burgess
Shelia Jean Burgess has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11200302Abstract: Autonomous embedded data cognition enables data to perform real-time environmental configuration control, self-manage, perform analyses, determine its current situation, and evaluate behavior to respond accordingly. When created, security measures, and access controls are selected. Highly sensitive data can be extracted and substituted with creator label and/or functional representation. Data-to-data reasoning and analysis can be performed. The processing method comprises autonomous monitoring for a state change and analyzing the current user to determine if the instantiation should exist. If affirmed, the cognition engine automatically configures the computational environment in which it resides. If denied, environmental behavior is further analyzed for security problems or an erroneous situation. If detected, the creator is alerted and provided with incident information enabling remote creator control of the data. Cognitive data can decide to self-destruct mitigating risk of undesirable instantiations.Type: GrantFiled: May 19, 2015Date of Patent: December 14, 2021Assignee: Azos AI, LLCInventors: Shelia Jean Burgess, George G. Burgess, IV
-
Publication number: 20150254442Abstract: Autonomous embedded data cognition enables data to perform real-time environmental configuration control, self-manage, perform analyses, determine its current situation, and evaluate behavior to respond accordingly. When created, security measures, and access controls are selected. Highly sensitive data can be extracted and substituted with creator label and/or functional representation. Data-to-data reasoning and analysis can be performed. The processing method comprises autonomous monitoring for a state change and analyzing the current user to determine if the instantiation should exist. If affirmed, the cognition engine automatically configures the computational environment in which it resides. If denied, environmental behavior is further analyzed for security problems or an erroneous situation. If detected, the creator is alerted and provided with incident information enabling remote creator control of the data. Cognitive data can decide to self-destruct mitigating risk of undesirable instantiations.Type: ApplicationFiled: May 19, 2015Publication date: September 10, 2015Inventors: Shelia Jean Burgess, George G. Burgess, IV
-
Publication number: 20140201526Abstract: A system, method, and apparatus for securing a date file or a cognitive encryption key data file stored in a storage medium or memory device. The date file or encryption key file having stored instructions for an embedded autonomous executable program which is executed each time there is an attempt to access, control, or manipulate the encryption key file includes querying a user of the date file or encryption key file, the user environment of the date file or encryption key file, or both, for information required for analyzing a computational environment in relation to required security parameters for the cognitive date file or encryption key file. The information in relation to the security parameters is received and analyzed. The computational environment of the user is determined and analyzed in relation to the required security parameters. Access to and/or use of the date file or encryption key file is either permitted or denied based on the analysis of the user and computational environment.Type: ApplicationFiled: March 17, 2014Publication date: July 17, 2014Inventor: Shelia Jean Burgess
-
Publication number: 20130133026Abstract: Aspects of the inventive subject matter relate in general to systems, methods, and apparatus for data cognition that incorporates autonomous security protection and embedded intelligence. More particularly, the inventive subject matter relates to systems, methods, and apparatus utilizing cognitive data, cognitive encryption key(s), and cognitive data structures or protocols that can perform analyses and assessments, self-manage and/or self-organize, secure its environment, evaluate behavior, detect security problems, adapt, work in conjunction with network communication and protocols, alert the data creator of an urgent situation (Situation Awareness), and provide traceability, electronic forensics, and possess self-knowledge so it can be discovered, searched, and support data management, dynamic endpoint security, and be influenced by user behavior.Type: ApplicationFiled: December 13, 2012Publication date: May 23, 2013Inventor: Shelia Jean Burgess
-
Publication number: 20120167164Abstract: A system, method, and apparatus for securing a cognitive encryption key data file stored in a storage medium or memory device. The encryption key file having stored instructions for an embedded autonomous executable program which is executed each time there is an attempt to access, control, or manipulate the encryption key file includes querying a user of the encryption key file, the user environment of the encryption key file, or both, for information required for analyzing a computational environment in relation to required security parameters for the cognitive encryption key file. The information in relation to the security parameters is received and analyzed. The computational environment of the user is determined and analyzed in relation to the required security parameters. Access to and/or use of the encryption key file is either permitted or denied based on the analysis of the user and computational environment.Type: ApplicationFiled: December 13, 2011Publication date: June 28, 2012Applicant: AZOS AI, LLCInventors: Shelia Jean BURGESS, George G. BURGESS, IV
-
Publication number: 20120163560Abstract: A communications controller and protocol are provided for empowering the user of a communications device, such as a telephone or mobile device, to assume intelligent control of communications. The communications controller provides conditional processing of incoming communication from a plurality of conditions comprising at least an emergency condition and a normal condition. Each caller is identified by unique originating source criteria associated with an incoming communication type. The user of the device may select to block a caller based on identification and the conditional type of the communication. The user also selects if the device is put into a unique mode where only emergency communication can alert the user. While in this mode “normal” communication will not alert the user of the communications device. Sensor data such as location of the sending device may be provided to the receiving party.Type: ApplicationFiled: December 19, 2011Publication date: June 28, 2012Applicant: Azos Al, LLCInventor: Shelia Jean BURGESS
-
Publication number: 20120151553Abstract: A method, apparatus and computer readable medium for data cognition incorporating autonomous security protection including, a data file stored on a storage medium, and having stored instructions for an embedded autonomous executable program which is executed each time there is an attempt to access, control, or manipulate the file, a processor for executing the program, an output device for communicating to a user, where communication is based on the result of executing the program in relation to parameters required for the data file by a data file original creator, and an input device for receiving a response to the communication. The method, apparatus, and computer readable medium autonomously monitors for a state change and analyzes the current user to determine if an instantiation should exist. If affirmed, a cognition engine automatically configures a computational environment in which it resides. If denied, environmental behavior is further analyzed for security problems.Type: ApplicationFiled: December 13, 2011Publication date: June 14, 2012Applicant: AZOS AI, LLCInventors: Shelia Jean BURGESS, George G. BURGESS, IV
-
Publication number: 20090007227Abstract: Autonomous embedded data cognition enables data to perform real-time environmental configuration control, self-manage, perform analyses, determine its current situation, and evaluate behavior to respond accordingly. When created, security measures, and access controls are selected. Highly sensitive data can be extracted and substituted with creator label and/or functional representation. Data-to-data reasoning and analysis can be performed. The processing method comprises autonomous monitoring for a state change and analyzing the current user to determine if the instantiation should exist. If affirmed, the cognition engine automatically configures the computational environment in which it resides. If denied, environmental behavior is further analyzed for security problems or an erroneous situation. If detected, the creator is alerted and provided with incident information enabling remote creator control of the data. Cognitive data can decide to self-destruct mitigating risk of undesirable instantiations.Type: ApplicationFiled: June 30, 2008Publication date: January 1, 2009Applicant: AZOS AI LLCInventors: Shelia Jean BURGESS, George G. Burgess, IV
-
Publication number: 20080285727Abstract: A communications controller and protocol are provided for empowering the user of a communications device, such as a telephone or other device, to assume intelligent control of communications. The communications controller provides conditional processing of incoming communication from a plurality of conditions comprising at least an emergency condition and a normal condition. Each caller is identified by unique originating source criteria associated with an incoming communication type. The user of the device may select to block callers based on their identification and the conditional type of the communication. The user also selects if the device is put into a unique mode where only emergency communication can alert the user. While in this mode “normal” communication will not alert the user of the communications device. Sensor data such as location of the sending device may be provided to the receiving party.Type: ApplicationFiled: May 16, 2007Publication date: November 20, 2008Inventor: Shelia Jean Burgess
-
Publication number: 20080139167Abstract: A communications controller is provided for empowering the user of a communications device, such as a telephone or other device, to assume control over incoming communications. Each originator of a communication is identified by unique identification information as information associated with an incoming communication. The user of a receiving communication device selects one of a plurality of different priority levels for a particular originator of a communication. The user also selects block time intervals for each priority to indicate times during which communication will not be passed to user's communications device or other appropriate action is to be taken. When that particular originator of a communication initiates a communication to the user, the user's communication controller determines the originator's identification information and recalls the priority and corresponding blocking time interval for that particular identity.Type: ApplicationFiled: January 2, 2008Publication date: June 12, 2008Inventor: Shelia Jean Burgess
-
Publication number: 20020128033Abstract: A communications controller is provided for empowering the user of a communications device, such as a telephone or other device, to assume control over incoming communications. This communications controller is based on artificial intelligence and behavior modeling techniques. Each communication is identified by unique identification information associated with an incoming communication. The user selects one of a plurality of different priority rating levels for a particular communication. The user also selects or infers block time intervals for each priority to indicate times during which incoming communication is not desired. Dynamic communications control is achieved by also determining the mood of the user or mode of the device. Undesirable communications will be “blocked”.Type: ApplicationFiled: January 24, 2002Publication date: September 12, 2002Inventor: Shelia Jean Burgess
-
Patent number: 6359970Abstract: A communications controller is provided for empowering the user of a communications device, such as a telephone or other device, to assume control over incoming communications. Each caller is identified by unique identification information as information associated with an incoming communication. The user selects one of a plurality of different priority levels for a particular caller. The user also selects block time intervals for each priority to indicate times during which calls will not be passed to user's communications device or other appropriate action is to be taken. When that particular caller places a call to the user, the user's communication controller determines the caller's identification information and recalls the priority and corresponding blocking time interval for that particular caller. The call is accordingly passed to the communication device or blocked.Type: GrantFiled: April 16, 1999Date of Patent: March 19, 2002Assignee: Maverick Consulting Services, Inc.Inventor: Shelia Jean Burgess