Patents by Inventor William Rodgers Ackerly

William Rodgers Ackerly has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240045996
    Abstract: A method for multi-factor, biometrics-based, secure data signature includes generating, by a biometrics reader device, a first biometric measurement using a physical characteristic of a user. The method includes selecting, by at least one noise-resistant feature transformation and hashing module executing on a processor of a computing device, a code word in a set of code words, wherein selecting further comprises applying an error correcting code to the first biometric measurement. The method includes generating, by the at least one noise-resistant feature transformation and hashing module, a first hash, wherein generating further comprises executing a hashing algorithm and using the selected code word as input to the hashing algorithm. The method includes generating, by the at least one noise-resistant feature transformation and hashing module, a public key and a private key, using the first hash. The method includes electronically signing, with the private key, data associated with the user.
    Type: Application
    Filed: August 3, 2023
    Publication date: February 8, 2024
    Inventors: Gadalia Montoya Weinberg O'Bryan, William Rodgers Ackerly
  • Publication number: 20230095504
    Abstract: A method of restricting data access based on properties of at least one of a process and a machine executing the process includes receiving, by an access control management system, from a first computing device, information associated with an encrypted data object. The method includes requesting, by the access control management system, from a verifier, verification that a second computing device executes a process in accordance with a process attribute identified in the information associated with the encrypted data object. The method includes sending, by the access control management system, to the second computing device, the received information associated with the encrypted data object, responsive to the verification of the process attribute.
    Type: Application
    Filed: December 2, 2022
    Publication date: March 30, 2023
    Inventors: Rebecca Claire Weiss, Reuven Mark Vallejo Gonzales, William Rodgers Ackerly
  • Patent number: 11531777
    Abstract: A method of restricting data access based on properties of at least one of a process and a machine executing the process includes receiving, by an access control management system, from a first computing device, information associated with an encrypted data object. The method includes requesting, by the access control management system, from a verifier, verification that a second computing device executes a process in accordance with a process attribute identified in the information associated with the encrypted data object. The method includes sending, by the access control management system, to the second computing device, the received information associated with the encrypted data object, responsive to the verification of the process attribute.
    Type: Grant
    Filed: January 23, 2020
    Date of Patent: December 20, 2022
    Assignee: Virtru Corporation
    Inventors: Rebecca Claire Weiss, Reuven Mark Vallejo Gonzales, William Rodgers Ackerly
  • Publication number: 20210281548
    Abstract: A method for securing data access by containerized applications includes intercepting, by a first container executing on a first computing device and associated with a containerized application in a second container executing on the first computing device, a first Internet Protocol (IP) request from the containerized application. The first container determines that the IP request is addressed to a second computing device executing a resource that the containerized application is authorized to access. The first container encrypts a payload portion of the IP request and transmits, to the resource, a second IP request with the encrypted payload portion. The first container receives, from the resource, a response. The first container requests, from a third computing device, a cryptographic key for decrypting the response. The first container decrypts, with the cryptographic key, a payload portion of the response and transmits, to the containerized application, the decrypted payload portion of the response.
    Type: Application
    Filed: February 24, 2021
    Publication date: September 9, 2021
    Inventors: William Rodgers Ackerly, Julian Embry Herwitz, Timothy Robert Tschampel
  • Publication number: 20200242267
    Abstract: A method of restricting data access based on properties of at least one of a process and a machine executing the process includes receiving, by an access control management system, from a first computing device, information associated with an encrypted data object. The method includes requesting, by the access control management system, from a verifier, verification that a second computing device executes a process in accordance with a process attribute identified in the information associated with the encrypted data object. The method includes sending, by the access control management system, to the second computing device, the received information associated with the encrypted data object, responsive to the verification of the process attribute.
    Type: Application
    Filed: January 23, 2020
    Publication date: July 30, 2020
    Inventors: Rebecca Claire Weiss, Reuven Mark Vallejo Gonzales, William Rodgers Ackerly
  • Patent number: 9578021
    Abstract: A method includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object. The access control management system receives, from a second client device, a request for the information. The access control management system verifies that a user of the second client device is identified in the received information. The access control management system selects an identity provider, based on a user identifier included in the received information, the user identifier associated with the user of the second client device. The access control management system requests from the selected identity provider, authentication of the user of the second client device. The access control management system sends, to the second client device, the received information. The access control management system stores an identification of at least one of the second client device and the received request for the information.
    Type: Grant
    Filed: November 23, 2015
    Date of Patent: February 21, 2017
    Inventor: William Rodgers Ackerly
  • Publication number: 20160119335
    Abstract: A method includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object. The access control management system receives, from a second client device, a request for the information. The access control management system verifies that a user of the second client device is identified in the received information. The access control management system selects an identity provider, based on a user identifier included in the received information, the user identifier associated with the user of the second client device. The access control management system requests from the selected identity provider, authentication of the user of the second client device. The access control management system sends, to the second client device, the received information. The access control management system stores an identification of at least one of the second client device and the received request for the information.
    Type: Application
    Filed: November 23, 2015
    Publication date: April 28, 2016
    Inventor: William Rodgers Ackerly
  • Patent number: 9225709
    Abstract: A method for distributing cryptographic data to trusted recipients includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object, the information including an identification of a platform for generating an integrity measurement digitally signed by a root of trust. The access control management system receives, from a second client device, a request for the information associated with the encrypted data object. The access control management system verifies that the second client device includes the platform for generating the integrity measurement digitally signed by the root of trust. The access control management system determines, based on the verification of the second client device, not to authenticate the second client device. The access control management system sends, to the second client device, the received information associated with the encrypted data object, responsive to the determination.
    Type: Grant
    Filed: September 18, 2014
    Date of Patent: December 29, 2015
    Assignee: Virtru Corporation
    Inventor: William Rodgers Ackerly
  • Publication number: 20150006884
    Abstract: A method for distributing cryptographic data to trusted recipients includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object, the information including an identification of a platform for generating an integrity measurement digitally signed by a root of trust. The access control management system receives, from a second client device, a request for the information associated with the encrypted data object. The access control management system verifies that the second client device includes the platform for generating the integrity measurement digitally signed by the root of trust. The access control management system determines, based on the verification of the second client device, not to authenticate the second client device. The access control management system sends, to the second client device, the received information associated with the encrypted data object, responsive to the determination.
    Type: Application
    Filed: September 18, 2014
    Publication date: January 1, 2015
    Inventor: William Rodgers Ackerly
  • Patent number: 8874902
    Abstract: A method for distributing cryptographic data to authenticated recipients includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object. The method includes receiving, by the access control management system, from a second client device, a request for the information associated with the encrypted data object. The method includes verifying, by the access control management system, that a user of the second client device is identified in the received information associated with the encrypted data object. The method includes authenticating, by the access control management system, with an identity provider, the user of the second client device. The method includes sending, by the access control management system, to the second client device, the received information associated with the encrypted data object.
    Type: Grant
    Filed: October 28, 2013
    Date of Patent: October 28, 2014
    Assignee: Virtru Corporation
    Inventor: William Rodgers Ackerly
  • Publication number: 20140052982
    Abstract: A method for distributing cryptographic data to authenticated recipients includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object. The method includes receiving, by the access control management system, from a second client device, a request for the information associated with the encrypted data object. The method includes verifying, by the access control management system, that a user of the second client device is identified in the received information associated with the encrypted data object. The method includes authenticating, by the access control management system, with an identity provider, the user of the second client device. The method includes sending, by the access control management system, to the second client device, the received information associated with the encrypted data object.
    Type: Application
    Filed: October 28, 2013
    Publication date: February 20, 2014
    Applicant: VirTru Corporation
    Inventor: William Rodgers Ackerly
  • Patent number: 8589673
    Abstract: A method for distributing cryptographic data to authenticated recipients includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object. The method includes receiving, by the access control management system, from a second client device, a request for the information associated with the encrypted data object. The method includes verifying, by the access control management system, that a user of the second client device is identified in the received information associated with the encrypted data object. The method includes authenticating, by the access control management system, with an identity provider, the user of the second client device. The method includes sending, by the access control management system, to the second client device, the received information associated with the encrypted data object.
    Type: Grant
    Filed: December 30, 2011
    Date of Patent: November 19, 2013
    Assignee: VirTru Corporation
    Inventor: William Rodgers Ackerly
  • Publication number: 20120179905
    Abstract: A method for distributing cryptographic data to authenticated recipients includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object. The method includes receiving, by the access control management system, from a second client device, a request for the information associated with the encrypted data object. The method includes verifying, by the access control management system, that a user of the second client device is identified in the received information associated with the encrypted data object. The method includes authenticating, by the access control management system, with an identity provider, the user of the second client device. The method includes sending, by the access control management system, to the second client device, the received information associated with the encrypted data object.
    Type: Application
    Filed: December 30, 2011
    Publication date: July 12, 2012
    Inventor: William Rodgers Ackerly