Patents by Inventor Steven Sprague
Steven Sprague has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240020418Abstract: Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage that are processed by an internet browser. The system may intercept data, such as text, images, and video input at the data input fields, prior to the data being posted online on a public service provider's website. The publishing node may control which users are permitted access to the posted data by defining a policy associated with the data input field. The posted data may be transformed or tokenized to ensure that it is inaccessible to a user (or group of users) unless that user/group is granted access to the decoding key under the policy. In this way, data security and data control may be provided to a publishing user node. Data that has already been posted may be destroyed, for example, by deleting the decryption key or a token.Type: ApplicationFiled: July 14, 2023Publication date: January 18, 2024Applicant: ESW Holdings, Inc.Inventors: Steven Sprague, Michael Sprague
-
Publication number: 20230385452Abstract: Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A privacy agent may process input field content to try to detect encoding markers in the input field content, which define portions of the content that are to be encoded. A third party key server may be used to store decoding keys. A URI reference to the decoding key may be used to access the decoding key by a node attempting to view the decoded version of the input field content.Type: ApplicationFiled: August 10, 2023Publication date: November 30, 2023Applicant: ESW Holdings, Inc.Inventors: Steven Sprague, Michael Sprague
-
Patent number: 11775686Abstract: Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A privacy agent may process input field content to try to detect encoding markers in the input field content, which define portions of the content that are to be encoded. A third party key server may be used to store decoding keys. A URI reference to the decoding key may be used to access the decoding key by a node attempting to view the decoded version of the input field content.Type: GrantFiled: August 25, 2021Date of Patent: October 3, 2023Assignee: ESW Holdings, Inc.Inventors: Steven Sprague, Michael Sprague
-
Patent number: 11741264Abstract: Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage that are processed by an internet browser. The system may intercept data, such as text, images, and video input at the data input fields, prior to the data being posted online on a public service provider's website. The publishing node may control which users are permitted access to the posted data by defining a policy associated with the data input field. The posted data may be transformed or tokenized to ensure that it is inaccessible to a user (or group of users) unless that user/group is granted access to the decoding key under the policy. In this way, data security and data control may be provided to a publishing user node. Data that has already been posted may be destroyed, for example, by deleting the decryption key or a token.Type: GrantFiled: December 24, 2021Date of Patent: August 29, 2023Assignee: ESW Holdings, Inc.Inventors: Steven Sprague, Michael Sprague
-
Publication number: 20220121780Abstract: Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage that are processed by an internet browser. The system may intercept data, such as text, images, and video input at the data input fields, prior to the data being posted online on a public service provider's website. The publishing node may control which users are permitted access to the posted data by defining a policy associated with the data input field. The posted data may be transformed or tokenized to ensure that it is inaccessible to a user (or group of users) unless that user/group is granted access to the decoding key under the policy. In this way, data security and data control may be provided to a publishing user node. Data that has already been posted may be destroyed, for example, by deleting the decryption key or a token.Type: ApplicationFiled: December 24, 2021Publication date: April 21, 2022Applicant: ESW Holdings, Inc.Inventors: Steven Sprague, Michael Sprague
-
Patent number: 11244074Abstract: Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage that are processed by an internet browser. The system may intercept data, such as text, images, and video input at the data input fields, prior to the data being posted online on a public service provider's website. The publishing node may control which users are permitted access to the posted data by defining a policy associated with the data input field. The posted data may be transformed or tokenized to ensure that it is inaccessible to a user (or group of users) unless that user/group is granted access to the decoding key under the policy. In this way, data security and data control may be provided to a publishing user node. Data that has already been posted may be destroyed, for example, by deleting the decryption key or a token.Type: GrantFiled: June 12, 2019Date of Patent: February 8, 2022Assignee: ESW HOLDINGS, INC.Inventors: Steven Sprague, Michael Sprague
-
Publication number: 20220021664Abstract: Device identification scoring systems and methods may be provided that can increase the reliability and security of communications between devices and service providers. Users may select and configure additional identification factors that are unique and convenient for them. These factors, along with additional environmental variables, feed into a trust score computation that weights the trustworthiness of the device context requesting communication with a service provider. Service providers rely on the trust score rather than enforce a specific identification routine themselves. A combination of identification factors selected by the user can be aggregated together to produce a trust score high enough to gain access to a given online service provider. A threshold of identification risk may be required to access a service or account provided by the online service provider.Type: ApplicationFiled: September 30, 2021Publication date: January 20, 2022Applicant: ESW Holdings, Inc.Inventors: Michael Sprague, Steven Sprague, Robert Thibadeau
-
Publication number: 20210383025Abstract: Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A privacy agent may process input field content to try to detect encoding markers in the input field content, which define portions of the content that are to be encoded. A third party key server may be used to store decoding keys. A URI reference to the decoding key may be used to access the decoding key by a node attempting to view the decoded version of the input field content.Type: ApplicationFiled: August 25, 2021Publication date: December 9, 2021Applicant: ESW Holdings, Inc.Inventors: Steven Sprague, Michael Sprague
-
Patent number: 11159501Abstract: Device identification scoring systems and methods may be provided that can increase the reliability and security of communications between devices and service providers. Users may select and configure additional identification factors that are unique and convenient for them. These factors, along with additional environmental variables, feed into a trust score computation that weights the trustworthiness of the device context requesting communication with a service provider. Service providers rely on the trust score rather than enforce a specific identification routine themselves. A combination of identification factors selected by the user can be aggregated together to produce a trust score high enough to gain access to a given online service provider. A threshold of identification risk may be required to access a service or account provided by the online service provider.Type: GrantFiled: April 14, 2020Date of Patent: October 26, 2021Assignee: ESW Holdings, Inc.Inventors: Michael Sprague, Steven Sprague, Robert Thibadeau
-
Patent number: 11132464Abstract: Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A privacy agent may process input field content to try to detect encoding markers in the input field content, which define portions of the content that are to be encoded. A third party key server may be used to store decoding keys. A URI reference to the decoding key may be used to access the decoding key by a node attempting to view the decoded version of the input field content.Type: GrantFiled: March 2, 2020Date of Patent: September 28, 2021Assignee: ESW Holdings, Inc.Inventors: Steven Sprague, Michael Sprague
-
Patent number: 11132463Abstract: Systems and methods may be provided for masking data on public networks. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A policy may be defined to control which users are permitted access to a key to decode the encoded content. The policy may defer to a third party policy node in determining key access. An account for a controlling entity, such as a guardian or employer, may be configured to control the encoding status of posts made by another. The controlling entity may control who has key access to decode posts made by the other account. The guardian account may be configured to have preemptive rights over posting decisions made by the minor.Type: GrantFiled: December 18, 2019Date of Patent: September 28, 2021Assignee: ESW Holdings, Inc.Inventors: Steven Sprague, Michael Sprague
-
Publication number: 20200257826Abstract: Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A privacy agent may process input field content to try to detect encoding markers in the input field content, which define portions of the content that are to be encoded. A third party key server may be used to store decoding keys. A URI reference to the decoding key may be used to access the decoding key by a node attempting to view the decoded version of the input field content.Type: ApplicationFiled: March 2, 2020Publication date: August 13, 2020Applicant: ESW Holdings, Inc.Inventors: Steven Sprague, Michael Sprague
-
Publication number: 20200244633Abstract: Device identification scoring systems and methods may be provided that can increase the reliability and security of communications between devices and service providers. Users may select and configure additional identification factors that are unique and convenient for them. These factors, along with additional environmental variables, feed into a trust score computation that weights the trustworthiness of the device context requesting communication with a service provider. Service providers rely on the trust score rather than enforce a specific identification routine themselves. A combination of identification factors selected by the user can be aggregated together to produce a trust score high enough to gain access to a given online service provider. A threshold of identification risk may be required to access a service or account provided by the online service provider.Type: ApplicationFiled: April 14, 2020Publication date: July 30, 2020Applicant: ESW Holdings, Inc.Inventors: Michael Sprague, Steven Sprague, Robert Thibadeau
-
Patent number: 10659439Abstract: Device identification scoring systems and methods may be provided that can increase the reliability and security of communications between devices and service providers. Users may select and configure additional identification factors that are unique and convenient for them. These factors, along with additional environmental variables, feed into a trust score computation that weights the trustworthiness of the device context requesting communication with a service provider. Service providers rely on the trust score rather than enforce a specific identification routine themselves. A combination of identification factors selected by the user can be aggregated together to produce a trust score high enough to gain access to a given online service provider. A threshold of identification risk may be required to access a service or account provided by the online service provider.Type: GrantFiled: April 8, 2016Date of Patent: May 19, 2020Assignee: ESW Holdings, Inc.Inventors: Michael Sprague, Steven Sprague, Robert Thibadeau
-
Publication number: 20200125764Abstract: Systems and methods may be provided for masking data on public networks. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A policy may be defined to control which users are permitted access to a key to decode the encoded content. The policy may defer to a third party policy node in determining key access. An account for a controlling entity, such as a guardian or employer, may be configured to control the encoding status of posts made by another. The controlling entity may control who has key access to decode posts made by the other account. The guardian account may be configured to have preemptive rights over posting decisions made by the minor.Type: ApplicationFiled: December 18, 2019Publication date: April 23, 2020Applicant: ESW Holdings, Inc.Inventors: Steven Sprague, Michael Sprague
-
Patent number: 10607029Abstract: Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A privacy agent may process input field content to try to detect encoding markers in the input field content, which define portions of the content that are to be encoded. A third party key server may be used to store decoding keys. A URI reference to the decoding key may be used to access the decoding key by a node attempting to view the decoded version of the input field content.Type: GrantFiled: April 16, 2018Date of Patent: March 31, 2020Assignee: ESW Holdings, Inc.Inventors: Steven Sprague, Michael Sprague
-
Patent number: 10552636Abstract: Systems and methods may be provided for masking data on public networks. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as text, images, and video input at the data input fields, prior to the content being posted online on a public service provider's website. A policy may be defined to control which users are permitted access to a key to decode the encoded content. The policy may defer to a third party policy node in determining key access. An account for a controlling entity, such as a guardian or employer, may be configured to control the encoding status of posts made by another. The controlling entity may control who has key access to decode posts made by the other account. The guardian account may be configured to have preemptive rights over posting decisions made by the minor.Type: GrantFiled: May 21, 2018Date of Patent: February 4, 2020Assignee: ESW Holdings, Inc.Inventors: Steven Sprague, Michael Sprague
-
Publication number: 20190294823Abstract: Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage that are processed by an internet browser. The system may intercept data, such as text, images, and video input at the data input fields, prior to the data being posted online on a public service provider's website. The publishing node may control which users are permitted access to the posted data by defining a policy associated with the data input field. The posted data may be transformed or tokenized to ensure that it is inaccessible to a user (or group of users) unless that user/group is granted access to the decoding key under the policy. In this way, data security and data control may be provided to a publishing user node. Data that has already been posted may be destroyed, for example, by deleting the decryption key or a token.Type: ApplicationFiled: June 12, 2019Publication date: September 26, 2019Applicant: ESW Holdings, Inc.Inventors: Steven Sprague, Michael Sprague
-
Publication number: 20190251249Abstract: Embodiments are direct to an improved approach for securing a passphrase, which only allows the user to provide the passphrase as a single phrase outside the trusted user device environment. The embodiments are direct to systems and methods that register a device of a user with a recovery application, including: (i) providing a passphrase for a user account and (ii) selecting friended devices configured in a trusted network of the user device. The systems and methods generate phrases or keys from the provided passphrase and divide the generated phrases or keys into sections. For each divided section, the systems and methods distribute the section to a friended device in the trusted network, where the section is stored. During an account transaction, the systems and methods retrieve the stored sections from the friended devices, and combine the retrieved sections into the user passphrase for accessing the user account.Type: ApplicationFiled: December 3, 2018Publication date: August 15, 2019Inventors: Steven Sprague, Alexis Sprague
-
Patent number: 10331908Abstract: Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage that are processed by an internet browser. The system may intercept data, such as text, images, and video input at the data input fields, prior to the data being posted online on a public service provider's website. The publishing node may control which users are permitted access to the posted data by defining a policy associated with the data input field. The posted data may be transformed or tokenized to ensure that it is inaccessible to a user (or group of users) unless that user/group is granted access to the decoding key under the policy. In this way, data security and data control may be provided to a publishing user node. Data that has already been posted may be destroyed, for example, by deleting the decryption key or a token.Type: GrantFiled: April 30, 2018Date of Patent: June 25, 2019Assignee: ESW Holdings, Inc.Inventors: Steven Sprague, Michael Sprague