166 patents
Utility
Relational database blockchain accountability
5 Dec 23
The present invention provides for employing SQL to introduce blockchain technologies into a relational database, and thereby leverage the inherent tamper-resistant properties of blockchain, without the need to completely rewrite existing or legacy relational database software.
Devon Andrew Beckett, James David Fletcher, Max Hirsch, Vidya Mudalagiri Venkatesha, Alex George
Filed: 10 Oct 19
Utility
System and Method for File and File System Integrity Using Directories
2 Nov 23
A processor-based method for securing directories through a persistent signature, comprising: selecting a directory; selecting a private key, a certificate identifier and a hash algorithm identifier for each selected directory; creating an encrypted hash of the directory using the hash algorithm and private key; and creating a persistent, independent signature for the directory that identifies the directory, certificate identifier, hash algorithm identifier, and the encrypted hash value for that directory.
Kelsey L. Bruso, Brian A. Wegleitner, Michael T. Kain
Filed: 2 May 22
Utility
System and Method for File and File System Integrity Independent of File Type or Contents
2 Nov 23
A processor-based method for securing files through a persistent signature includes: selecting a file of any file type; selecting a private key, a certificate identifier and a hash algorithm identifier for the file; creating an encrypted hash of the file using the hash algorithm and private key for the file; and creating a persistent, independent signature for each selected file that identifies the file, certificate identifier, hash algorithm identifier, and the encrypted hash value for the file.
Kelsey L. Bruso, Brian A. Wegleitner, Michael T. Kain
Filed: 2 May 22
Utility
System and Method for Verifying a Secured File, Directory or Meta-data
2 Nov 23
A processor-based method for verifying a secured file, directory, or meta-data, comprising: extracting a persistent, independent signature for a secured file, directory, or meta-data from a directory signature file, the signature identifying a certificate identifier, a hash algorithm identifier, and an encrypted hash value for that secured file, directory, or meta-data; retrieving a public key corresponding to the certificate identifier; decrypting the encrypted hash using the public key and a decryption tool, resulting in a clear text hash value; creating a new hash value for the secured file, directory, or meta-data, the hash creation corresponding to the hash algorithm identifier; and verifying the signature when the new hash value for the secured file, directory, or meta-data matches the unencrypted hash value from the persistent, independent signature for the secured file, directory, or meta-data,
Kelsey L. Bruso, Brian A. Wegleitner, Michael T. Kain
Filed: 2 May 22
Utility
System and Method for Creating a Persistent Directory Signature File
2 Nov 23
A processor-based method for creating a persistent directory signature file, comprising: selecting a private key, a certificate identifier and a hash algorithm identifier for the directory signature file; concatenating one or more persistent, independent signatures wherein a persistent independent signature includes a file name, sub-directory indicator, or meta-data indicator, and a certificate identifier, and a hash identifier, and an encrypted hash; creating an encrypted hash of the one or more concatenated signatures using the hash algorithm and private key chosen for the directory signature file; and concatenating the encrypted hash of the one or more concatenated signatures with the concatenated signatures and the certificate identifier, and hash algorithm identifier chosen for the directory signature file to create a persistent, independent signature for the directory signature file.
Kelsey L Bruso, Brian A. Wegleitner, Michael T. Kain
Filed: 2 May 22
Utility
System and Method for File and File System Integrity Using Meta-data
2 Nov 23
A processor-based method for securing meta-data through a persistent signature, comprising: identifying meta-data for a file; selecting a private key, a certificate identifier and a hash algorithm identifier for the meta-data; creating an encrypted hash of the meta-data using the hash algorithm and private key; and creating a persistent, independent signature for the meta-data that identifies the meta-data, certificate identifier, hash algorithm identifier, and the encrypted hash value for the meta-data.
Kelsey L. Bruso, Brian A. Wegleitner, Michael T. Kain
Filed: 2 May 22
Utility
Object identification system with reduced service calls
24 Oct 23
Methods and systems for implementing an object identification system equipped to reduce the number of service calls for remote object identification lookups are disclosed.
James Plasek, Mark Rosno, Shardul Patil, Hayden Donze, Max Hirsch
Filed: 9 Oct 20
Utility
Creating a Secondary Index
5 Oct 23
A processor-based method of creating a secondary index for a B-tree in a database includes creating an empty secondary index; traversing the B-tree to find the left most data page to begin processing; capturing the current system time; placing a read-lock on the data page; retrieving a first primary key value for the data page; writing the first primary key value to a control information for the B-tree; creating a secondary index entry and writing it into the secondary index; and releasing the read-lock.
Kelsey L Bruso, James M. PIasek
Filed: 31 Mar 22
Utility
Creating a Secondary Index Using a Clone
5 Oct 23
A processor-based method of creating a secondary index includes creating an empty secondary index; capturing the current system time; cloning the database to create a cloned database; writing to a file a secondary index column value and a primary key column value from rows in the cloned database that meet search criteria; populate the secondary index using sorted data; writing, periodically, a row number being processed from the file to control information for the B-tree; and clearing the row number.
Kelsey L Bruso, James M. Plasek
Filed: 31 Mar 22
Utility
Updating a Secondary Index from an Audit Trail
5 Oct 23
A processor-based method of updating a secondary index for a B-tree in a database in a DBMS to include subsequent changes that occurred during creation of the secondary index includes opening an audit trail and moving back in the audit trail to a captured system time; making the secondary index visible to the DBMS for INSERT, UPDATE and DELETE processing; reading a next committed set of database updates from the audit trail; creating a secondary index modification for each row on each audit trail update and applying it to the secondary index; clearing the captured system time from control information for the B-tree to indicate completion; and making the secondary index visible to the DBMS for all processing.
Kelsey L Bruso, James M. Plasek
Filed: 31 Mar 22
Utility
Method of Making a File Containing a Secondary Index Recoverable During Processing
5 Oct 23
A processor-based method of making a file containing a secondary index recoverable during processing of the secondary index includes: capturing a current system time as a captured system time and writing the captured system time to control information; finding writes to the file containing the secondary index; also writing the writes to an audit trail; using the captured system time in control information for the secondary index as a start time for recovery; determining if there is a primary key value in the control information; using a primary key value in the control information to traverse to a data page continuing the primary key value; placing a read-lock on the data page; creating a corresponding secondary index entry; and releasing the read-lock.
Kelsey L Bruso, James M. Plasek
Filed: 31 Mar 22
Utility
Certificate-based remote dynamic isolation of IOT devices using distributed ledger technologies
15 Aug 23
Methods and systems for remote dynamic isolation of IoT devices are provided.
Sanket Panchamia, Kanupriya Pandey, Mehdi Entezari, Sachin B Patil, Amith Kk, Robert A Johnson
Filed: 15 Sep 21
Utility
System and method for securely debugging across multiple execution contexts
30 May 23
A system and method for a virtual processor base/virtual execution context arrangement.
Andrew Ward Beale, David Strong
Filed: 8 Mar 21
Utility
Method of Presenting an Interactive Virtual Classroom
18 May 23
A method of presenting a virtual class in a presentation having a start time, normal speed, and end time includes determining if the presentation is being started after the start time and if so, determining a delay tine; determining if the presentation is to be presented at the normal speed, and if so, presenting the presentation at the normal speed and finishing the presentation at the end time plus the delay time; if the presentation is not to be presented at the normal speed, presenting the presentation at an accelerated speed such that the presentation ends at the end time.
Kelsey L. Bruso, Mangesh Walsatwar, Ramkumar M., George S.
Filed: 12 Nov 21
Utility
Method of Decomposing a Lecture into Events
18 May 23
A method of decomposing a lecture into events includes: processing a recorded video and segmenting the video into video, chat, audio and audio transcript; processing the video and dividing it into discreet events including lecture, green board text, white board text, and interaction with users; and storing the discreet events as a storyboard that identifies break points in the lecture.
Kelsey L Bruso, Mangesh Walsatwar, Ramkumar M., George S.
Filed: 12 Nov 21
Utility
Creating Action-trigger Phrase Sets
23 Mar 23
A method of creating action-trigger phrase sets includes receiving a document from a corpus of documents; processing text from the document; and creating an action-trigger phrase set from the text.
Mark Rosno, Patrick Deziel, Christopher Korzenowski, Rebecca Bilbro, Kelsey L. Bruso, Robert Malek
Filed: 19 Sep 21
Utility
System and method for responsive process security classification and optimization
28 Feb 23
A system and method for the storage within one or more virtual execution context registers private code representative of processes or other information requiring an enhanced degree of security.
Andrew Ward Beale, David Strong
Filed: 8 Mar 21
Utility
Visual Instruction During Running of a Visual Instruction Sequence
2 Feb 23
A method of improving a visual instruction during running of a visual instruction sequence includes playing a visual instruction sequence to a user from a point-of-view of the user; monitoring the user for user data related to the visual instruction sequence; using the user data to improve the visual instruction sequence; generating an improved visual instruction sequence; and playing the improved visual instruction sequence to the user from a point-of-view of the user.
Kelsey L. Bruso, James M. Plasek
Filed: 2 Aug 21
Utility
Creating an Instruction Database
2 Feb 23
A method of creating an instruction database includes searching various information sources for instruction information related to a user task; searching various information sources for safety information related to the user task; extracting the instruction information and safety information and saving the instruction information and safety information in the instruction database; and receiving user comments and saving the comments in the instruction database.
Kelsey L. Bruso, James M. Plasek
Filed: 2 Aug 21
Utility
Certificate-based Remote Dynamic Isolation of Iot Devices Using Distributed Ledger Technologies
8 Dec 22
Methods and systems for remote dynamic isolation of IoT devices are provided.
Sanket Panchamia, Kanupriya Pandey, Mehdi Entezari, Sachin B. Patil, Amith Kk, Robert A. Johnson
Filed: 15 Sep 21