Patents by Inventor Tomas Revesz
Tomas Revesz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20180374148Abstract: Disclosed embodiments include methods, systems, and computer-readable media configured to, for example, implement methods for online repeat-auctions. An exemplary method may include receiving, by an input/output module a request from a device of a requestor, the request associated with an electronic source. The request may also include instructions concerning the request from a bidder device of a bidder. Further, the method may include determining, by a quality module, a quality value for the requestor based on the electronic source associated with the request. The method may also include setting, by a bidding module, an amount based on the instructions and the quality value for the requestor. Additionally, the method may include choosing the bidder for the request based on the amount. The method may include delivering, by a tracking module and the input/output module, request information.Type: ApplicationFiled: June 19, 2018Publication date: December 27, 2018Inventors: C. Deniz AKYUZ, Lei XIA, Tomas REVESZ, Seth BIRNBAUM
-
Publication number: 20180101912Abstract: Disclosed embodiments include methods, systems, and computer-readable media configured to, for example, implement methods for online repeat-auctions. An exemplary method comprises receiving, via an electronic network, a request from a requestor device associated with an electronic source at least one bid for the request from at least one electronic bidder device. The method further comprises determining at least one quality value for the requestor, which may be based on at least the electronic source associated with the requestor. The method further comprises filtering the at least one bid based on the at least one quality value and at least one quality value. The quality value may be associated with at least one request previously delivered to the at least one electronic bidder. The method further comprises choosing a winning bid of the at least one bid and delivering the request to an electronic bidder device associated with the winning bid.Type: ApplicationFiled: June 21, 2017Publication date: April 12, 2018Inventors: C. Deniz AKYUZ, Lei XIA, Tomas REVESZ, Seth BIRNBAUM
-
Patent number: 7934091Abstract: A technique for establishing a perimeter of accountability for usage of digital assets such as data files. The accountability model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such as in the background of a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, aggregates them, and makes reports to a journaling server. The journaling server analyzes sequences of low level events to detect when aggregate events of interest occur, such as “FileEdit”, network file transfers and the like. Reports can be generated to provide an understanding of how digital assets have been accessed, used or communicated by individuals in an enterprise.Type: GrantFiled: December 9, 2008Date of Patent: April 26, 2011Assignee: Verdasys, Inc.Inventors: Nicholas Stamos, Seth N. Birnbaum, Tomas Revesz, Jr., Donato Buccella, Keith A. MacDonald, Dwayne A. Carson, William E. Fletcher
-
Patent number: 7814021Abstract: A technique for establishing usage control over digital assets such as computer files. The system model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such a background process in a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, and aggregates them. A policy engine analyzes sequences of aggregate events to determine when policy violations occur.Type: GrantFiled: November 12, 2003Date of Patent: October 12, 2010Assignee: Verdasys, Inc.Inventors: Nicholas Stamos, Seth N. Birnbaum, Tomas Revesz, Jr., Donato Buccella, Keith A. MacDonald, Dwayne A. Carson, William E. Fletcher
-
Publication number: 20090198765Abstract: A technique for establishing a perimeter of accountability for usage of digital assets such as data files. The accountability model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such as in the background of a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, aggregates them, and makes reports to a journaling server. The journaling server analyzes sequences of low level events to detect when aggregate events of interest occur, such as “FileEdit”, network file transfers and the like. Reports can be generated to provide an understanding of how digital assets have been accessed, used or communicated by individuals in an enterprise.Type: ApplicationFiled: December 9, 2008Publication date: August 6, 2009Applicant: Verdasys, Inc.Inventors: Nicholas Stamos, Seth N. Birnbaum, Tomas Revesz, JR., Donato Buccella, Keith A. MacDonald, Dwayne A. Carson, William E. Fletcher
-
Patent number: 7472272Abstract: A technique for establishing a perimeter of accountability for usage of digital assets such as data files. The accountability model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such as in the background of a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, aggregates them, and makes reports to a journaling server. The journaling server analyzes sequences of low level events to detect when aggregate events of interest occur, such as “FileEdit”, network file transfers and the like. Reports can be generated to provide an understanding of how digital assets have been accessed, used or communicated by individuals in an enterprise.Type: GrantFiled: November 18, 2003Date of Patent: December 30, 2008Assignee: Verdasys, Inc.Inventors: Nicholas Stamos, Seth N. Birnbaum, Tomas Revesz, Jr., Donato Buccella, Keith A. MacDonald, Dwayne A. Carson, William E. Fletcher
-
Publication number: 20050060537Abstract: A technique for establishing usage control over digital assets such as computer files. The system model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such a background process in a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, and aggregates them. A policy engine analyzes sequences of aggregate events to determine when policy violations occur.Type: ApplicationFiled: November 12, 2003Publication date: March 17, 2005Applicant: Verdasys, Inc.Inventors: Nicholas Stamos, Seth Birnbaum, Tomas Revesz, Donato Buccella, Keith MacDonald, Dwayne Carson, William Fletcher
-
Publication number: 20040255160Abstract: A technique for establishing a perimeter of accountability for usage of digital assets such as data files. The accountability model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such as in the background of a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, aggregates them, and makes reports to a journaling server. The journaling server analyzes sequences of low level events to detect when aggregate events of interest occur, such as “FileEdit”, network file transfers and the like. Reports can be generated to provide an understanding of how digital assets have been accessed, used or communicated by individuals in an enterprise.Type: ApplicationFiled: November 18, 2003Publication date: December 16, 2004Applicant: Verdasys, Inc.Inventors: Nicholas Stamos, Seth N. Birnbaum, Tomas Revesz, Donato Buccella, Keith A. MacDonald, Dwayne A. Carson, William E. Fletcher