Patents by Inventor Tomas Revesz

Tomas Revesz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180374148
    Abstract: Disclosed embodiments include methods, systems, and computer-readable media configured to, for example, implement methods for online repeat-auctions. An exemplary method may include receiving, by an input/output module a request from a device of a requestor, the request associated with an electronic source. The request may also include instructions concerning the request from a bidder device of a bidder. Further, the method may include determining, by a quality module, a quality value for the requestor based on the electronic source associated with the request. The method may also include setting, by a bidding module, an amount based on the instructions and the quality value for the requestor. Additionally, the method may include choosing the bidder for the request based on the amount. The method may include delivering, by a tracking module and the input/output module, request information.
    Type: Application
    Filed: June 19, 2018
    Publication date: December 27, 2018
    Inventors: C. Deniz AKYUZ, Lei XIA, Tomas REVESZ, Seth BIRNBAUM
  • Publication number: 20180101912
    Abstract: Disclosed embodiments include methods, systems, and computer-readable media configured to, for example, implement methods for online repeat-auctions. An exemplary method comprises receiving, via an electronic network, a request from a requestor device associated with an electronic source at least one bid for the request from at least one electronic bidder device. The method further comprises determining at least one quality value for the requestor, which may be based on at least the electronic source associated with the requestor. The method further comprises filtering the at least one bid based on the at least one quality value and at least one quality value. The quality value may be associated with at least one request previously delivered to the at least one electronic bidder. The method further comprises choosing a winning bid of the at least one bid and delivering the request to an electronic bidder device associated with the winning bid.
    Type: Application
    Filed: June 21, 2017
    Publication date: April 12, 2018
    Inventors: C. Deniz AKYUZ, Lei XIA, Tomas REVESZ, Seth BIRNBAUM
  • Patent number: 7934091
    Abstract: A technique for establishing a perimeter of accountability for usage of digital assets such as data files. The accountability model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such as in the background of a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, aggregates them, and makes reports to a journaling server. The journaling server analyzes sequences of low level events to detect when aggregate events of interest occur, such as “FileEdit”, network file transfers and the like. Reports can be generated to provide an understanding of how digital assets have been accessed, used or communicated by individuals in an enterprise.
    Type: Grant
    Filed: December 9, 2008
    Date of Patent: April 26, 2011
    Assignee: Verdasys, Inc.
    Inventors: Nicholas Stamos, Seth N. Birnbaum, Tomas Revesz, Jr., Donato Buccella, Keith A. MacDonald, Dwayne A. Carson, William E. Fletcher
  • Patent number: 7814021
    Abstract: A technique for establishing usage control over digital assets such as computer files. The system model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such a background process in a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, and aggregates them. A policy engine analyzes sequences of aggregate events to determine when policy violations occur.
    Type: Grant
    Filed: November 12, 2003
    Date of Patent: October 12, 2010
    Assignee: Verdasys, Inc.
    Inventors: Nicholas Stamos, Seth N. Birnbaum, Tomas Revesz, Jr., Donato Buccella, Keith A. MacDonald, Dwayne A. Carson, William E. Fletcher
  • Publication number: 20090198765
    Abstract: A technique for establishing a perimeter of accountability for usage of digital assets such as data files. The accountability model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such as in the background of a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, aggregates them, and makes reports to a journaling server. The journaling server analyzes sequences of low level events to detect when aggregate events of interest occur, such as “FileEdit”, network file transfers and the like. Reports can be generated to provide an understanding of how digital assets have been accessed, used or communicated by individuals in an enterprise.
    Type: Application
    Filed: December 9, 2008
    Publication date: August 6, 2009
    Applicant: Verdasys, Inc.
    Inventors: Nicholas Stamos, Seth N. Birnbaum, Tomas Revesz, JR., Donato Buccella, Keith A. MacDonald, Dwayne A. Carson, William E. Fletcher
  • Patent number: 7472272
    Abstract: A technique for establishing a perimeter of accountability for usage of digital assets such as data files. The accountability model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such as in the background of a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, aggregates them, and makes reports to a journaling server. The journaling server analyzes sequences of low level events to detect when aggregate events of interest occur, such as “FileEdit”, network file transfers and the like. Reports can be generated to provide an understanding of how digital assets have been accessed, used or communicated by individuals in an enterprise.
    Type: Grant
    Filed: November 18, 2003
    Date of Patent: December 30, 2008
    Assignee: Verdasys, Inc.
    Inventors: Nicholas Stamos, Seth N. Birnbaum, Tomas Revesz, Jr., Donato Buccella, Keith A. MacDonald, Dwayne A. Carson, William E. Fletcher
  • Publication number: 20050060537
    Abstract: A technique for establishing usage control over digital assets such as computer files. The system model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access rights. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such a background process in a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, and aggregates them. A policy engine analyzes sequences of aggregate events to determine when policy violations occur.
    Type: Application
    Filed: November 12, 2003
    Publication date: March 17, 2005
    Applicant: Verdasys, Inc.
    Inventors: Nicholas Stamos, Seth Birnbaum, Tomas Revesz, Donato Buccella, Keith MacDonald, Dwayne Carson, William Fletcher
  • Publication number: 20040255160
    Abstract: A technique for establishing a perimeter of accountability for usage of digital assets such as data files. The accountability model not only tracks authorized users' access to files, but monitors passage of such files to uncontrollable removable storage media or through network connections and the like which may indicate possible abuse of access. In accordance with a preferred embodiment, an autonomous independent agent process running at a point of use, such as in the background of a client operating system kernel, interrupts requests for access to resources. The agent process senses low level system events, filters, aggregates them, and makes reports to a journaling server. The journaling server analyzes sequences of low level events to detect when aggregate events of interest occur, such as “FileEdit”, network file transfers and the like. Reports can be generated to provide an understanding of how digital assets have been accessed, used or communicated by individuals in an enterprise.
    Type: Application
    Filed: November 18, 2003
    Publication date: December 16, 2004
    Applicant: Verdasys, Inc.
    Inventors: Nicholas Stamos, Seth N. Birnbaum, Tomas Revesz, Donato Buccella, Keith A. MacDonald, Dwayne A. Carson, William E. Fletcher