Patents by Inventor Steven Coutts
Steven Coutts has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20150082413Abstract: A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data.Type: ApplicationFiled: June 24, 2014Publication date: March 19, 2015Inventors: Steven Spicer, Christopher Martin, Larry Kuhl, Brian Hollander, Patrick Pidduck, Phillip Von Hatten, Mark Onischke, Clayton Grassick, Tim Lehan, Steven Coutts
-
Publication number: 20150074791Abstract: A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data.Type: ApplicationFiled: June 17, 2014Publication date: March 12, 2015Inventors: Steven Spicer, Christopher Martin, Larry Kuhl, Brian Hollander, Patrick Pidduck, Phillip Von Hatten, Mark Onischke, Clayton Grassick, Tim Lehan, Steven Coutts
-
Publication number: 20150074789Abstract: A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data.Type: ApplicationFiled: June 17, 2014Publication date: March 12, 2015Inventors: Steven Spicer, Christopher Martin, Larry Kuhl, Brian Hollander, Patrick Pidduck, Phillip Von Hatten, Mark Onischke, Clayton Grassick, Tim Lehan, Steven Coutts
-
Publication number: 20150074790Abstract: A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data.Type: ApplicationFiled: June 17, 2014Publication date: March 12, 2015Inventors: Steven Spicer, Christopher Martin, Larry Kuhl, Brian Hollander, Patrick Pidduck, Phillip Von Hatten, Mark Onischke, Clayton Grassick, Tim Lehan, Steven Coutts
-
Publication number: 20130104225Abstract: A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data.Type: ApplicationFiled: July 11, 2012Publication date: April 25, 2013Applicant: PRINTERON INC.Inventors: Steven Spicer, Christopher Martin, Larry Kuhl, Brian Hollander, Patrick Pidduck, Steven Coutts, Phillip Von Hatten, Mark Onischke, Clayton Grassick, Tim Lehan
-
Publication number: 20130104224Abstract: A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data.Type: ApplicationFiled: July 11, 2012Publication date: April 25, 2013Applicant: PRINTERON INC.Inventors: Steven Spicer, Christopher Martin, Larry Kuhl, Brian Hollander, Patrick Pidduck, Steven Coutts, Phillip Von Hatten, Mark Onischke, Clayton Grassick, Tim Lehan
-
Publication number: 20130104223Abstract: A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data.Type: ApplicationFiled: July 11, 2012Publication date: April 25, 2013Applicant: PRINTERON INC.Inventors: Steven Spicer, Christopher Martin, Larry Kuhl, Brian Hollander, Patrick Pidduck, Steven Coutts, Philip Von Hatten, Mark Onischke, Clayton Grassick, Tim Lehan
-
Publication number: 20130104222Abstract: A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data.Type: ApplicationFiled: July 11, 2012Publication date: April 25, 2013Applicant: PRINTERON INC.Inventors: Steven Spicer, Christopher Martin, Larry Kuhl, Brian Hollander, Patrick Pidduck, Steven Coutts, Philip Von Hatten, Mark Onischke, Clayton Grassick, Tim Lehan
-
Publication number: 20120023569Abstract: A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data.Type: ApplicationFiled: September 27, 2010Publication date: January 26, 2012Inventors: Steven Spicer, Christopher Martin, Larry Kuhl, Brian Hollander, Patrick Pidduck, Steven Coutts, Phillip Von Hatten, Mark Onischke, Clayton Grassick, Tim Lehan
-
Publication number: 20120011581Abstract: A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data.Type: ApplicationFiled: September 27, 2010Publication date: January 12, 2012Inventors: Steven Spicer, Christopher Martin, Larry Kuhl, Brian Hollander, Patrick Pidduck, Steven Coutts, Phillip Von Hatten, Mark Onischke, Clayton Grassick, Tim Lehan
-
Publication number: 20120011583Abstract: A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data.Type: ApplicationFiled: September 27, 2010Publication date: January 12, 2012Inventors: Steven Spicer, Christopher Martin, Larry Kuhl, Brian Hollander, Patrick Pidduck, Steven Coutts, Philip Von Hatten, Mark Onischke, Clayton Grassick, Tim Lehan
-
Publication number: 20120011582Abstract: A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data.Type: ApplicationFiled: September 27, 2010Publication date: January 12, 2012Inventors: Steven Spicer, Christopher Martin, Larry Kuhl, Brian Hollander, Patrick Pidduck, Steven Coutts, Phillip Von Hatten, Mark Onischke, Clayton Grassick, Tim Lehan
-
Patent number: 7827293Abstract: A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data.Type: GrantFiled: March 1, 2001Date of Patent: November 2, 2010Assignee: Printeron Inc.Inventors: Steven Spicer, Christopher Martin, Larry Kuhl, Brian Hollander, Patrick Pidduck, Steven Coutts, Philip Von Hatten, Mark Onischke, Clayton Grassick, Tim Lehan
-
Patent number: 7249188Abstract: A network resource control system allows network terminals to communicate with network resources, and includes a resource registry, an authorization server and an administration server. The resource registry includes resource records which are associated with the network resources and define at least a user access level for each network resource. The authorization server is in communication with the resource registry and controls network access to the network resources in accordance with the resource records. The administration server is in communication with the resource registry and provides controlled access to the resource records. The administration server receives user access control data from administrators of the network resources for incorporation into the resource records. Depending upon the user access control data received, the authorization server configures the network terminals for communication with the network resources.Type: GrantFiled: December 16, 2005Date of Patent: July 24, 2007Assignee: Spicer CorporationInventors: Steven Spicer, Christopher Martin, Larry Kuhl, Brian Hollander, Patrick Pidduck, Steven Coutts, Philip Von Hatten, Mark Onischke, Clayton Grassick, Tim Lehan
-
Publication number: 20060168258Abstract: A network resource control system allows network terminals to communicate with network resources, and includes a resource registry, an authorization server and an administration server. The resource registry includes resource records which are associated with the network resources and define at least a user access level for each network resource. The authorization server is in communication with the resource registry and controls network access to the network resources in accordance with the resource records. The administration server is in communication with the resource registry and provides controlled access to the resource records. The administration server receives user access control data from administrators of the network resources for incorporation into the resource records. Depending upon the user access control data received, the authorization server configures the network terminals for communication with the network resources.Type: ApplicationFiled: December 16, 2005Publication date: July 27, 2006Inventors: Steven Spicer, Christopher Martin, Larry Kuhl, Brian Hollander, Patrick Pidduck, Steven Coutts, Philip Hatten, Mark Onischke, Clayton Grassick, Tim Lehan
-
Patent number: 7007093Abstract: A network resource control system allows network terminals to communicate with network resources, and includes a resource registry, an authorization server and an administration server. The resource registry includes resource records which are associated with the network resources and define at least a user access level for each network resource. The authorization server is in communication with the resource registry and controls network access to the network resources in accordance with the resource records. The administration server is in communication with the resource registry and provides controlled access to the resource records. The administration server receives user access control data from administrators of the network resources for incorporation into the resource records. Depending upon the user access control data received, the authorization server configures the network terminals for communication with the network resources.Type: GrantFiled: March 1, 2001Date of Patent: February 28, 2006Assignee: Spicer CorporationInventors: Steven Spicer, Christopher Martin, Larry Kuhl, Brian Hollander, Patrick Pidduck, Steven Coutts, Philip Von Hatten, Mark Onischke, Clayton Grassick, Tim Lehan
-
Patent number: 6990527Abstract: A network resource access system provides network terminals with access to network resources over a network, and includes a resource registry, a driver database, and an authorization server. The resource registry includes resource records associated with the network resources and define at least a resource type for each network resource. The driver database includes resource driver applications for the network resources. The authorization server receives a request from one of the network terminals for communication with one of the network resources, obtains resource configuration data associated with the network resource, and then facilitates communication between the network terminal and the network resource in accordance with a correspondence between the resource configuration data and user configuration data associated with the network terminal.Type: GrantFiled: March 1, 2001Date of Patent: January 24, 2006Assignee: Spicer CorporationInventors: Steven Spicer, Christopher Martin, Larry Kuhl, Brian Hollander, Patrick Pidduck, Steven Coutts, Philip Von Hatten, Mark Onischke, Clayton Grassick, Tim Lehan
-
Publication number: 20030051038Abstract: A network resource control system allows network terminals to communicate with network resources, and includes a resource registry, an authorization server and an administration server. The resource registry includes resource records which are associated with the network resources and define at least a user access level for each network resource. The authorization server is in communication with the resource registry and controls network access to the network resources in accordance with the resource records. The administration server is in communication with the resource registry and provides controlled access to the resource records. The administration server receives user access control data from administrators of the network resources for incorporation into the resource records. Depending upon the user access control data received, the authorization server configures the network terminals for communication with the network resources.Type: ApplicationFiled: January 18, 2002Publication date: March 13, 2003Inventors: Steven Spicer, Christopher Martin, Larry Kuhl, Brian Hollander, Patrick Pidduck, Steven Coutts, Philip Von Hatten, Mark Onishcke, Clayton Grassick, Tim Lehan
-
Publication number: 20030037126Abstract: A network resource access system provides network terminals with access to network resources over a network, and includes a resource registry, a driver database, and an authorization server. The resource registry includes resource records associated with the network resources and define at least a resource type for each network resource. The driver database includes resource driver applications for the network resources. The authorization server receives a request from one of the network terminals for communication with one of the network resources, obtains resource configuration data associated with the network resource, and then facilitates communication between the network terminal and the network resource in accordance with a correspondence between the resource configuration data and user configuration data associated with the network terminal.Type: ApplicationFiled: January 18, 2002Publication date: February 20, 2003Inventors: Steven Spicer, Christoper Martin, Larry Kuhl, Brian Hollander, Patrick Pidduck, Steven Coutts, Philip Von Hatten, Mark Onischke, Clayton Grassick, Tim Lehan
-
Publication number: 20020143773Abstract: A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data.Type: ApplicationFiled: January 18, 2002Publication date: October 3, 2002Inventors: Steven Spicer, Christopher Martin, Larry Kuhl, Brian Hollander, Patrick Pidduck, Steven Coutts, Philip Von Hatten, Mark Onischke, Clayton Grassick, Tim Lehan