Patents by Inventor William J. Heaton
William J. Heaton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8370646Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: GrantFiled: September 25, 2009Date of Patent: February 5, 2013Assignee: xSides CorporationInventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
-
Publication number: 20120237029Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” and “replace and restore.Type: ApplicationFiled: May 1, 2012Publication date: September 20, 2012Inventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
-
Publication number: 20100077360Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: September 25, 2009Publication date: March 25, 2010Inventors: D. DAVID NASON, CARSON KAAN, JOHN E. EASTON, JASON M. SMITH, JOHN A. PAINTER, WILLIAM J. HEATON
-
Publication number: 20100077231Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: ApplicationFiled: September 25, 2009Publication date: March 25, 2010Inventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
-
Publication number: 20090254965Abstract: Methods and systems for enhancing the storage and display of video data and other digital content in a set-top box or other television environment so that such data is securely stored and displayed are provided. Example embodiments provide an enhanced display controller (EDC) that executes in an electronic device, such as a set-top box, to provide secure storage and playback of streamed digital content. The EDC creates or identifies a secure storage location and stores the data stream in that secure location in a secure manner, thereby minimizing unauthorized access. In addition, the EDC supports the secure display of the data stream using standard (or proprietary) encryption techniques, and/or obfuscation techniques. The EDC also optionally supports various requirements for complying with the usage limitations typically associated with DRM data content. In one embodiment, the enhanced display controller is a modified set-top display (device) driver that includes a VBI decoder, mechanisms (e.g.Type: ApplicationFiled: June 15, 2009Publication date: October 8, 2009Inventors: Jason M. Smith, D. David Nason, John A. Painter, William J. Heaton
-
Patent number: 7007025Abstract: Methods and systems for enhancing the security of data during input and output on a client computer system are provided to prevent attempts by unauthorized code to access, intercept, and/or modify data. Example embodiments provide a plurality of obfuscation techniques and security enhanced drivers that use these obfuscation techniques to prohibit unauthorized viewing/receiving of valid data. When the drivers are used together with the various obfuscation techniques, the security enhanced drivers provide mechanisms for “scheduling” the content of the storage areas used to store the data so that valid data is not available to unauthorized recipients. When unauthorized recipients attempt to access the “data,” they perceive or receive obfuscated data. The obfuscation techniques described include “copy-in,” “replace and restore,” and “in-place replacement” de-obfuscation/re-obfuscation techniques.Type: GrantFiled: June 10, 2002Date of Patent: February 28, 2006Assignee: xSides CorporationInventors: D. David Nason, Carson Kaan, John E. Easton, Jason M. Smith, John A. Painter, William J. Heaton
-
Publication number: 20030001978Abstract: Methods and systems for enhancing the storage and display of video data and other digital content in a set-top box or other television environment so that such data is securely stored and displayed are provided. Example embodiments provide an enhanced display controller (EDC) that executes in an electronic device, such as a set-top box, to provide secure storage and playback of streamed digital content. The EDC creates or identifies a secure storage location and stores the data stream in that secure location in a secure manner, thereby minimizing unauthorized access. In addition, the EDC supports the secure display of the data stream using standard (or proprietary) encryption techniques, and/or obfuscation techniques. The EDC also optionally supports various requirements for complying with the usage limitations typically associated with DRM data content. In one embodiment, the enhanced display controller is a modified set-top display (device) driver that includes a VBI decoder, mechanisms (e.g.Type: ApplicationFiled: June 12, 2002Publication date: January 2, 2003Applicant: xSides CorporationInventors: Jason M. Smith, D. David Nason, John A. Painter, William J. Heaton
-
Patent number: 6256069Abstract: The generation of progressive output video from interlaced source video is disclosed. In one aspect of the invention, a computerized system includes an interlaced source video and a progressive output video. The interlaced source video has a number of lines and includes a first field having odd lines and a second field haveing even lines. The progressive output video has a number of lines half that of the number of lines of the interlaced source video. Each line of the progressive output video heavily weight weights a corresponding line of each of the first field and the second field of the interlaced source video. Desirably, each line of the progressive output video also lightly weights an immediately successive and an immediately preceding line of each of the first field and the second field of the interlaced video source.Type: GrantFiled: October 6, 1998Date of Patent: July 3, 2001Assignee: Microsoft CorporationInventors: Andrew D. Rosen, William J. Heaton, John A. Painter, Philip G. Zack
-
Patent number: 6081264Abstract: An optimal frame rate selection user interface is disclosed. In one aspect of the invention, a method has two steps. First, a video clip is displayed within at least one window, to permit dividing the clip into a plurality of shots (where each shot has a plurality of frames). Second, each shot is displayed in at least two windows, to permit selecting a desired frame rate for each shot. Desirably, each of these windows displays a given shot at a different frame rate. Therefore, a user is able to view each shot at a number of different frame rates to determine an optimal frame rate for each shot.Type: GrantFiled: February 13, 1998Date of Patent: June 27, 2000Assignee: Microsoft CorporationInventors: Andrew D. Rosen, Brian D. Honey, William J. Heaton, John A. Painter, Philip G. Zack