Patents by Inventor Steven H. McCown
Steven H. McCown has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20170308894Abstract: A secure computing module (SCM) is configured for connection with a host device. The SCM includes a processor for performing secure processing operations, a host interface for coupling the processor to the host device, and a memory connected to the processor wherein the processor logically isolates at least some of the memory from access by the host device. The SCM generates a secure digital signature for a financial transaction and enables controlled content received through the host device. File distribution is performed from a content provider to a buyer or from a reseller to a buyer. The file distribution includes a financial transaction using secure digital signatures and possibly message encryption. The digital signatures and transaction details are communicated to appropriate financial organizations to authenticate the transaction parties and complete the transaction. The controlled content is transferred to the buyer from either the content provider or the reseller.Type: ApplicationFiled: July 11, 2017Publication date: October 26, 2017Inventors: Steven H. McCown, Aaron R. Turner
-
Patent number: 8737965Abstract: Wireless device monitoring systems and monitoring devices include a communications module for receiving wireless communications of a wireless device. Processing circuitry is coupled with the communications module and configured to process the wireless communications to determine whether the wireless device is authorized or unauthorized to be present at the monitored area based on identification information of the wireless device. Methods of monitoring for the presence and identity of wireless devices are also provided.Type: GrantFiled: August 8, 2008Date of Patent: May 27, 2014Assignee: Battelle Energy Alliance, LLCInventors: Steven H. McCown, Kurt W. Derr, Kenneth W. Rohde
-
Patent number: 8175578Abstract: Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.Type: GrantFiled: May 7, 2007Date of Patent: May 8, 2012Assignee: Battelle Energy Alliance, LLCInventors: Steven H. McCown, Kurt W. Derr, Kenneth W. Rohde
-
Publication number: 20120066518Abstract: Security is provided for a data set stored in a data storage canister. The data set has a data size when received for storage within the canister. At least one data security operation is performed on the received data set to generate secure data having a secure data size that may be different than the set data size. The secure data is stored on at least one data storage device within the canister. Any information about the secure data size is kept from the data producer sending the data set for storage.Type: ApplicationFiled: August 2, 2011Publication date: March 15, 2012Applicant: STORAGE TECHNOLOGY CORPORATIONInventors: Steven H. McCown, Stephen S. Selkirk, Charles A. Milligan, James P. Hughes, Jacques Debiez
-
Patent number: 7680502Abstract: A radio frequency detection assembly is described and which includes a radio frequency detector which detects a radio frequency emission produced by a radio frequency emitter from a given location which is remote relative to the radio frequency detector; a location assembly electrically coupled with the radio frequency detector and which is operable to estimate the location of the radio frequency emitter from the radio frequency emission which has been received; and a radio frequency transmitter electrically coupled with the radio frequency detector and the location assembly, and which transmits a radio frequency signal which reports the presence of the radio frequency emitter.Type: GrantFiled: July 28, 2006Date of Patent: March 16, 2010Inventors: Steven H. McCown, Kurt Warren Derr
-
Publication number: 20090216681Abstract: A secure computing module (SCM) is configured for connection with a host device. The SCM includes a processor for performing secure processing operations, a host interface for coupling the processor to the host device, and a memory connected to the processor wherein the processor logically isolates at least some of the memory from access by the host device. The SCM also includes a proximate-field wireless communicator connected to the processor to communicate with another SCM associated with another host device. The SCM generates a secure digital signature for a financial transaction package and communicates the package and the signature to the other SCM using the proximate-field wireless communicator. Financial transactions are performed from person to person using the secure digital signature of each person's SCM and possibly message encryption.Type: ApplicationFiled: August 22, 2008Publication date: August 27, 2009Applicant: BATTELLE ENERGY ALLIANCE, LLCInventor: Steven H. McCown
-
Publication number: 20090216680Abstract: A secure computing module (SCM) is configured for connection with a host device. The SCM includes a processor for performing secure processing operations, a host interface for coupling the processor to the host device, and a memory connected to the processor wherein the processor logically isolates at least some of the memory from access by the host device. The SCM generates a secure digital signature for a financial transaction and enables controlled content received through the host device. File distribution is performed from a content provider to a buyer or from a reseller to a buyer. The file distribution includes a financial transaction using secure digital signatures and possibly message encryption. The digital signatures and transaction details are communicated to appropriate financial organizations to authenticate the transaction parties and complete the transaction. The controlled content is transferred to the buyer from either the content provider or the reseller.Type: ApplicationFiled: August 22, 2008Publication date: August 27, 2009Applicant: BATTELLE ENERGY ALLIANCE, LLCInventors: Steven H. McCown, Aaron R. Turner
-
Publication number: 20080291013Abstract: Wireless device monitoring systems and monitoring devices include a communications module for receiving wireless communications of a wireless device. Processing circuitry is coupled with the communications module and configured to process the wireless communications to determine whether the wireless device is authorized or unauthorized to be present at the monitored area based on identification information of the wireless device. Methods of monitoring for the presence and identity of wireless devices are also provided.Type: ApplicationFiled: August 8, 2008Publication date: November 27, 2008Applicant: BATTELLE ENERGY ALLIANCE, LLCInventors: STEVEN H. MCCOWN, KURT W. DERR, KENNETH W. ROHDE
-
Publication number: 20080280592Abstract: Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.Type: ApplicationFiled: May 7, 2007Publication date: November 13, 2008Inventors: Steven H. McCown, Kurt W. Derr, Kenneth W. Rohde
-
Patent number: 7426541Abstract: Electronic mail is archived and retrieved based on metadata generated by the client sending the electronic mail. The metadata is generated based on variable metadata generation policies distributed to each client. The metadata generation policies are executed in each client in conjunction with each electronic mail sent from the client. The electronic mail is received in a mail server on route to at least one addressee of the electronic mail. The received electronic mail is processed based on the metadata attached to the received electronic mail.Type: GrantFiled: September 7, 2004Date of Patent: September 16, 2008Assignee: Storage Technology CorporationInventor: Steven H. McCown
-
Patent number: 7400510Abstract: The present invention provides a flexible storage system through the use of portable, removable canisters holding multiple storage subsystems.Type: GrantFiled: December 27, 2004Date of Patent: July 15, 2008Assignee: Storage Technology CorporationInventors: Charles A. Milligan, Michael L. Leonhardt, Stephen S. Selkirk, Thai Nguyen, Steven H. McCown, Michael V. Konshak, Robert Klunker, Gerald O. Nions, Jacques Debiez, Ludovic Duval, Philippe Y. Le. Graverand
-
Publication number: 20080025238Abstract: A radio frequency detection assembly is described and which includes a radio frequency detector which detects a radio frequency emission produced by a radio frequency emitter from a given location which is remote relative to the radio frequency detector; a location assembly electrically coupled with the radio frequency detector and which is operable to estimate the location of the radio frequency emitter from the radio frequency emission which has been received; and a radio frequency transmitter electrically coupled with the radio frequency detector and the location assembly, and which transmits a radio frequency signal which reports the presence of the radio frequency emitter.Type: ApplicationFiled: July 28, 2006Publication date: January 31, 2008Inventors: Steven H. McCown, Kurt Warren Derr
-
Patent number: 7304855Abstract: The present invention provides a flexible storage system through the use of portable, removable canisters holding multiple storage subsystems.Type: GrantFiled: March 2, 2004Date of Patent: December 4, 2007Assignee: Storage Technology CorporationInventors: Charles A. Milligan, Michael L. Leonhardt, Stephen S. Selkirk, Thai Nguyen, Steven H. McCown, Michael V. Konshak, Robert Klunker, Gerald O'Nions, Jacques Debiez, Ludovic Duval, Philippe Y. Le Graverand
-
Patent number: 7024395Abstract: A customer making a credit card transaction inserts their smart card into a card reader attached to the merchant's system. The card reader activates the customer's card and passes certain merchant information. The merchant's system then requests a “billing digest” from the customer's card. The billing digest is returned to the merchant's card reader that forwards it (and the transaction information which includes customer information and merchant information) to the corresponding credit card issuer, which maintains the customer's credit card account. In one embodiment, the customer information and the merchant information are encrypted. Upon receiving the billing digest, transaction information is decrypted if necessary and the credit card issuer looks up the customer's master key using the customer's account number.Type: GrantFiled: June 16, 2000Date of Patent: April 4, 2006Assignee: Storage Technology CorporationInventors: Steven H. McCown, James P. Hughes, Michael L. Leonhardt, Charles A. Milligan
-
Patent number: 6708272Abstract: An encryption system permits end-to-end encryption of information over an untrusted interconnection network. The information encryption system includes at least one client for processing information. The system also includes at least one storage device for holding the information. At least one key server provides a data key for encrypting and decrypting the information. An encryption module is associated with each client. Each encryption module has a first processor accessing a first memory and a second processor accessing a second memory different from the first memory. The first processor communicates with the associated client. The second processor communicates with the storage device. The first processor communicates with the second processor through a dedicated channel. The second processor obtains the data key from the key server. Information is received from the first processor over the dedicated channel and encrypted using the data key. The encrypted information is then stored on the storage device.Type: GrantFiled: May 20, 1999Date of Patent: March 16, 2004Assignee: Storage Technology CorporationInventors: Steven H. McCown, Thai Nguyen, Michael L. Leonhardt
-
Publication number: 20030051159Abstract: A method, computer program product, and data storage device for downloading data with variable quality (including audio or video data) from a server in a network to a computer or network-connected storage device is disclosed.Type: ApplicationFiled: September 11, 2001Publication date: March 13, 2003Inventors: Steven H. McCown, Stephen S. Selkirk, Thomas Nelson Noland, Michael L. Leonhardt, Charles A. Milligan
-
Publication number: 20020184490Abstract: A method, computer program product, and data storage device for directly downloading data (including audio or video data) from a server in a network to a network-connected storage device is disclosed. The invention prevents piracy of copyrighted data by bypassing any unencrypted transmission to a computer system. A computer sends a request to a server to download the particular data to a particular storage device. The server contacts the storage device directly through the network to initiate the transfer. The server and storage device communicate over an encrypted data channel so as to prevent any third party, including the aforementioned computer, from intercepting and storing the transmitted data.Type: ApplicationFiled: June 5, 2001Publication date: December 5, 2002Applicant: Storage Technology CorporationInventors: Steven H. McCown, Stephen S. Selkirk, Thomas Nelson Noland, Michael L. Leonhardt, Charles A. Milligan
-
Publication number: 20020124168Abstract: A method and system for enhancing a user environment having product with a component operable to run at a low operating level and a high operating level in which the component is set to operate at the low operating level includes associating an upgrade key with the product. The upgrade key has permission instructions for the component to operate at the high operating level. The component is then enabled to operate at the high operating level in response to the upgrade key being associated with the product in order to upgrade the user environment.Type: ApplicationFiled: December 28, 2000Publication date: September 5, 2002Inventors: Steven H. Mccown, Charles A. Milligan, Jeffrey A. Knight