Patents by Inventor William Rodgers

William Rodgers has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250217455
    Abstract: A method for attribute based group access control includes receiving, by a data event monitor of an access control management system, a notification identifying a data object uploaded to a data store. The method includes analyzing, by the data event monitor, at least one characteristic of the data object, wherein analyzing further comprises analyzing metadata associated with the data object. The method includes generating, by a data analysis engine of the access control management system, based upon the analyzing, at least one attribute-based access control rule. The method includes associating, by an access group generator of the access control management system, a group identifier with the data object, the group identifier specifying a type of user satisfying the at least one attribute-based access control rule.
    Type: Application
    Filed: December 30, 2024
    Publication date: July 3, 2025
    Inventors: William Rodgers Ackerly, Timothy Robert Tschampel, Timothy Allen Dumm
  • Patent number: 12147552
    Abstract: Embodiments of the present disclosure include systems and methods for scanning for and identifying sensitive data in unexpected locations of data storage structures. Once sensitive data is found in unexpected locations of data storage structures, actions can be taken to remediate the unexpected storage of the sensitive data.
    Type: Grant
    Filed: November 16, 2021
    Date of Patent: November 19, 2024
    Assignee: United Services Automobile Association (USAA)
    Inventors: Michael Peter Gout, Christopher Edward Flores, Benjamin James Nadeau, Fredrick William Rodgers
  • Publication number: 20240250937
    Abstract: A method for securing data access by containerized applications includes intercepting, by a first container executing on a first computing device and associated with a containerized application in a second container executing on the first computing device, a first Internet Protocol (IP) request from the containerized application. The first container determines that the IP request is addressed to a second computing device executing a resource that the containerized application is authorized to access. The first container encrypts a payload portion of the IP request and transmits, to the resource, a second IP request with the encrypted payload portion. The first container receives, from the resource, a response. The first container requests, from a third computing device, a cryptographic key for decrypting the response. The first container decrypts, with the cryptographic key, a payload portion of the response and transmits, to the containerized application, the decrypted payload portion of the response.
    Type: Application
    Filed: April 7, 2024
    Publication date: July 25, 2024
    Inventors: William Rodgers Ackerly, Julian Embry Herwitz, Timothy Robert Tschampel
  • Patent number: 11991155
    Abstract: A method for securing data access by containerized applications includes intercepting, by a first container executing on a first computing device and associated with a containerized application in a second container executing on the first computing device, a first Internet Protocol (IP) request from the containerized application. The first container determines that the IP request is addressed to a second computing device executing a resource that the containerized application is authorized to access. The first container encrypts a payload portion of the IP request and transmits, to the resource, a second IP request with the encrypted payload portion. The first container receives, from the resource, a response. The first container requests, from a third computing device, a cryptographic key for decrypting the response. The first container decrypts, with the cryptographic key, a payload portion of the response and transmits, to the containerized application, the decrypted payload portion of the response.
    Type: Grant
    Filed: February 24, 2021
    Date of Patent: May 21, 2024
    Assignee: Virtru Corporation
    Inventors: William Rodgers Ackerly, Julian Embry Herwitz, Timothy Robert Tschampel
  • Publication number: 20240045996
    Abstract: A method for multi-factor, biometrics-based, secure data signature includes generating, by a biometrics reader device, a first biometric measurement using a physical characteristic of a user. The method includes selecting, by at least one noise-resistant feature transformation and hashing module executing on a processor of a computing device, a code word in a set of code words, wherein selecting further comprises applying an error correcting code to the first biometric measurement. The method includes generating, by the at least one noise-resistant feature transformation and hashing module, a first hash, wherein generating further comprises executing a hashing algorithm and using the selected code word as input to the hashing algorithm. The method includes generating, by the at least one noise-resistant feature transformation and hashing module, a public key and a private key, using the first hash. The method includes electronically signing, with the private key, data associated with the user.
    Type: Application
    Filed: August 3, 2023
    Publication date: February 8, 2024
    Inventors: Gadalia Montoya Weinberg O'Bryan, William Rodgers Ackerly
  • Patent number: 11847246
    Abstract: Techniques are described for communicating between two organizations without exchanging sensitive private information. One of the methods includes generating a token representative of private data. The method includes identifying at least one entity associated with the private data. The method includes associating the token with at least one entity. The method also includes providing information identifying at least one entity and the token to a machine learning system.
    Type: Grant
    Filed: September 12, 2018
    Date of Patent: December 19, 2023
    Assignee: United Services Automobile Association (USAA)
    Inventors: Fredrick William Rodgers, Michael P. Gout
  • Patent number: 11713187
    Abstract: An article manufactured in a mould and which comprises a structural composite of plastics layers, the article having a wall defining an internal space for holding contents therein; wherein, the wall is formed from at least two layers of plastics materials; wherein a first of said layers comprises a thermoplastics material and at least a second layer comprises a thermosetting resin and a fibrous layer.
    Type: Grant
    Filed: June 9, 2021
    Date of Patent: August 1, 2023
    Assignee: OMNI TANKER TECHNOLOGY PTY LTD (ACN 135 294 772)
    Inventor: William Rodgers
  • Publication number: 20230095504
    Abstract: A method of restricting data access based on properties of at least one of a process and a machine executing the process includes receiving, by an access control management system, from a first computing device, information associated with an encrypted data object. The method includes requesting, by the access control management system, from a verifier, verification that a second computing device executes a process in accordance with a process attribute identified in the information associated with the encrypted data object. The method includes sending, by the access control management system, to the second computing device, the received information associated with the encrypted data object, responsive to the verification of the process attribute.
    Type: Application
    Filed: December 2, 2022
    Publication date: March 30, 2023
    Inventors: Rebecca Claire Weiss, Reuven Mark Vallejo Gonzales, William Rodgers Ackerly
  • Patent number: 11580081
    Abstract: A system and method for detecting anomalies in very large datasets is disclosed. The method includes calculating statistics for data elements in a data set over a range of time periods. These statistics are arranged into a 2D array and analyzed using a machine learning algorithm to detect anomalous regions. The method also includes steps of analyzing time series of the data based on detected anomalous regions, correcting any errors in the datasets, and storing the corrected values in a separate database to maintain data integrity.
    Type: Grant
    Filed: October 29, 2020
    Date of Patent: February 14, 2023
    Assignee: United Services Automobile Association (USAA)
    Inventor: Fredrick William Rodgers
  • Patent number: 11531777
    Abstract: A method of restricting data access based on properties of at least one of a process and a machine executing the process includes receiving, by an access control management system, from a first computing device, information associated with an encrypted data object. The method includes requesting, by the access control management system, from a verifier, verification that a second computing device executes a process in accordance with a process attribute identified in the information associated with the encrypted data object. The method includes sending, by the access control management system, to the second computing device, the received information associated with the encrypted data object, responsive to the verification of the process attribute.
    Type: Grant
    Filed: January 23, 2020
    Date of Patent: December 20, 2022
    Assignee: Virtru Corporation
    Inventors: Rebecca Claire Weiss, Reuven Mark Vallejo Gonzales, William Rodgers Ackerly
  • Publication number: 20210281548
    Abstract: A method for securing data access by containerized applications includes intercepting, by a first container executing on a first computing device and associated with a containerized application in a second container executing on the first computing device, a first Internet Protocol (IP) request from the containerized application. The first container determines that the IP request is addressed to a second computing device executing a resource that the containerized application is authorized to access. The first container encrypts a payload portion of the IP request and transmits, to the resource, a second IP request with the encrypted payload portion. The first container receives, from the resource, a response. The first container requests, from a third computing device, a cryptographic key for decrypting the response. The first container decrypts, with the cryptographic key, a payload portion of the response and transmits, to the containerized application, the decrypted payload portion of the response.
    Type: Application
    Filed: February 24, 2021
    Publication date: September 9, 2021
    Inventors: William Rodgers Ackerly, Julian Embry Herwitz, Timothy Robert Tschampel
  • Patent number: 11059665
    Abstract: An article manufactured in a mould and which comprises a structural composite of plastics layers, the article having a wall defining an internal space for holding contents therein; wherein, the wall is formed from at least two layers of plastics materials; wherein a first of said layers comprises a thermoplastics material and at least a second layer comprises a thermosetting resin and a fibrous layer.
    Type: Grant
    Filed: November 21, 2016
    Date of Patent: July 13, 2021
    Assignee: OMNI TANKER TECHNOLOGY PTY LTD (ACN 135 294 772)
    Inventor: William Rodgers
  • Publication number: 20200242267
    Abstract: A method of restricting data access based on properties of at least one of a process and a machine executing the process includes receiving, by an access control management system, from a first computing device, information associated with an encrypted data object. The method includes requesting, by the access control management system, from a verifier, verification that a second computing device executes a process in accordance with a process attribute identified in the information associated with the encrypted data object. The method includes sending, by the access control management system, to the second computing device, the received information associated with the encrypted data object, responsive to the verification of the process attribute.
    Type: Application
    Filed: January 23, 2020
    Publication date: July 30, 2020
    Inventors: Rebecca Claire Weiss, Reuven Mark Vallejo Gonzales, William Rodgers Ackerly
  • Patent number: 9578021
    Abstract: A method includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object. The access control management system receives, from a second client device, a request for the information. The access control management system verifies that a user of the second client device is identified in the received information. The access control management system selects an identity provider, based on a user identifier included in the received information, the user identifier associated with the user of the second client device. The access control management system requests from the selected identity provider, authentication of the user of the second client device. The access control management system sends, to the second client device, the received information. The access control management system stores an identification of at least one of the second client device and the received request for the information.
    Type: Grant
    Filed: November 23, 2015
    Date of Patent: February 21, 2017
    Inventor: William Rodgers Ackerly
  • Publication number: 20160119335
    Abstract: A method includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object. The access control management system receives, from a second client device, a request for the information. The access control management system verifies that a user of the second client device is identified in the received information. The access control management system selects an identity provider, based on a user identifier included in the received information, the user identifier associated with the user of the second client device. The access control management system requests from the selected identity provider, authentication of the user of the second client device. The access control management system sends, to the second client device, the received information. The access control management system stores an identification of at least one of the second client device and the received request for the information.
    Type: Application
    Filed: November 23, 2015
    Publication date: April 28, 2016
    Inventor: William Rodgers Ackerly
  • Patent number: 9324980
    Abstract: Described in this disclosure is a battery retention device which may include an integral gasket configured to provide an interface between a portion of a battery compartment and a circuit board. The battery retention device may comprise an elastomeric material and one or more retention features configured to prevent Euler buckling in batteries positioned in tandem with one another.
    Type: Grant
    Filed: September 30, 2013
    Date of Patent: April 26, 2016
    Assignee: Amazon Technologies, Inc.
    Inventors: Jason Evans Goulden, Mi Zhou, Shelomon Patrick Doblack, William Rodgers Wylde
  • Patent number: 9225709
    Abstract: A method for distributing cryptographic data to trusted recipients includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object, the information including an identification of a platform for generating an integrity measurement digitally signed by a root of trust. The access control management system receives, from a second client device, a request for the information associated with the encrypted data object. The access control management system verifies that the second client device includes the platform for generating the integrity measurement digitally signed by the root of trust. The access control management system determines, based on the verification of the second client device, not to authenticate the second client device. The access control management system sends, to the second client device, the received information associated with the encrypted data object, responsive to the determination.
    Type: Grant
    Filed: September 18, 2014
    Date of Patent: December 29, 2015
    Assignee: Virtru Corporation
    Inventor: William Rodgers Ackerly
  • Publication number: 20150368375
    Abstract: Method of preparing a crosslinked oxidation resistant ultrahigh molecular weight polyethylene polymer (UHMWPE) involves 1) forming a blend containing UHMWPE powder, a crosslinker, and optionally an antioxidant; 2) applying first conditions of pressure and heat to consolidate the UHMWPE and 3) applying second conditions of heat to activate the crosslinker and crosslink the consolidated UHMWPE. The crosslinker activates at high temperature and is peroxide free.
    Type: Application
    Filed: June 24, 2014
    Publication date: December 24, 2015
    Inventors: William Rodgers, III, Jordan H. Freedman
  • Publication number: 20150209635
    Abstract: A device for detection of tampering with the interior of sports implements or other hollow opaque objects. The device is inserted in the interior of the object and includes an RFID tag with supporting microcircuitry for transmission of a signal. The signal can be detected outside of the device. Persistence of the signal indicates that the body of the object has not been breached or otherwise adulterated. The microcircuitry includes a kill switch that terminates the signal when the interior of the object has been compromised. Inability to detect a signal indicates tampering of the object. The device enables quick and easy screening of objects for compliance with rules or performance standards.
    Type: Application
    Filed: January 26, 2015
    Publication date: July 30, 2015
    Inventors: Daniel Silvain, William Rodger Gateley, Douglas Paul Miller
  • Publication number: 20150006884
    Abstract: A method for distributing cryptographic data to trusted recipients includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object, the information including an identification of a platform for generating an integrity measurement digitally signed by a root of trust. The access control management system receives, from a second client device, a request for the information associated with the encrypted data object. The access control management system verifies that the second client device includes the platform for generating the integrity measurement digitally signed by the root of trust. The access control management system determines, based on the verification of the second client device, not to authenticate the second client device. The access control management system sends, to the second client device, the received information associated with the encrypted data object, responsive to the determination.
    Type: Application
    Filed: September 18, 2014
    Publication date: January 1, 2015
    Inventor: William Rodgers Ackerly