Peter has built a cohesive team to aid in the creation of ideas. Peter leads in the design and concept of patentable ideas and works with his team to ensure proof of concept and credibility.
THIS LIST IS DELIBERATELY NOT COMPLETE AND SHOULD NOT BE RELIED UPON AS A DEFINITIVE LIST.
|Patent Number||Patents Published|
|7,716,736 B2||Apparatus, methods and articles of manufacture for
computer virus testing
Abstract: The present invention comprises apparatus, methods
and articles of manufacture for computer virus testing in a networked
environment. A host is provided that permits uploading of suspected
files by a user. They are transferred to a server, where they are
scanned for the presence of known virii. The files are then run,
in an appropriate operating environment, separate from the operating
system of the server, and the results compared to and noted against a
reference. Any modified files are logged, as is some embodiments, the
lists of modified files are made available to various users.
|7,703,078 B2||Apparatus, methods and articles of manufacture for
Abstract: Apparatus methods and articles of manufacture
for software demonstration are disclosed. Apparatus include a
server that provides, via a network, a program or programs to
be demonstrated to a user. The user uploads the code that the
program will execute. Results are then supplied after execution,
and may be made available to the user in a number of ways.
methods and articles of manufacture are also disclosed.
|7,370,795 B2||Medicine Management Methods and Apparatus
Abstract: Methods and apparatus are shown for providing
information on a pill. A patient specific delivery apparatus
for medicine using information on a pill or pills is shown as
well, and a database with patient specific information may be
provided, resulting in a individualized pharmacopoeia for a patient.
|7,503,069 B2||Network Traffic Intercepting Method And System
Abstract: A computer system and method for intercepting,
examining, and controlling data streams flowing via transport
connections between the transport layer of an operating system
and the user application. All data streams that pass from a external
network, through the transport layer of an operating system to the
user application to the transport layer are intercepted by a network
traffic interceptor. The network traffic interceptor processes all data streams for proscribed data that may include viruses, trojan horses, worms, and other hostile algorithms. The processing used by the network traffic interceptor can include monitoring blacking or destroying data, thereby protecting the single computer system from being infected by hostile algorithms.
|7,502,939 B2||Software Virus Detection Methods And Apparatus
Abstract: Software virus detection methods, apparatus and articles of manufacture are shown. In the preferred embodiments, these comprise review of proscribed code by an evaluative interpreter, which interprets the code in order to review the code for the presence of disguised viral or other code. The interpreted result is then first scanned for the presence of file open, or file modify or other instructions of interest, as well as scanned again for the presence of viral code signatures. The results are reported as desired.
|7,502,829 B2||Apparatus, Methods And Articles Of Manufacture For Intercepting. Examining And Controlling Code. Data And Files And Their Transfer
Abstract: Apparatus, methods, and articles of manufacture are claimed for processing code comprising the preprocessing of code, transferring of the code from a storage area to a transfer component, decomposing the code, valuing the code, and comparing the code to a threshold value. The processing indicates the presence or absence of proscribed code, which may be spam, virii, confidential material, harassing material, etc and so the code my be redirected. The especially preferred embodiments operate within a UNIX sendmail environment.
|7,404,212 B2||Medicine Management Methods Appartus
Abstract: Methods and apparatus are shown for providing information on a pill. A patient specific delivery apparatus for medicine using information on a pill or pills is shown as well, and a database with patient specific information my be provided, resulting in an individualized pharmacopoeia for a patient.
|7,404,212 B2||Apparatus and Methods for Intercepting, Examining and Controlling Code, Data and Files and Their Transfer
Abstract: The present invention coprises apparatus and methods for processing code streams in a network. “Man in the middle” technology by use of decryptor/encryptor components are placed between client and server which permit alternation of the code as it passes through a communication channel. the code may then be examined by way of a proscribed code scanner. A protocol parser may also be implemented in order to intercept the code as it passes through the stack and transfer the code to decryptoe/encryptor components.
|7,363,506 B2||Software Virus Detection Methods, Apparatus and Articles of Manufacture
Abstract: Methods, apparatus and articles of manufacture for
indentifying, authenticating and securing code through proscribed code
detection and deletion are shown. The preferred embodiments provide for
scanning code determine the presence of prescribed code and the transmitting
the code to a file reconstructor upon the detection of proscribed code.
At the file reconstruction, templaes of the specfic document type are used
to provide the document file structure, and so delete with precision the
proscribed code from the orginal code.
|7,389,540 B2||Apparatus, Methods For Intercepting, Examing and Controlling
Code, Data and Files and Their Transfer
Abstract: The present invention comprises apparatus and methods
for processing code, that is, for intercepting, examing and/or
controlling code streams in a network. A protocol parser is
implemented in order to intercept the code as it passes through
the channel and transfers the code to a proscribed code
scanner. Embodiments for various platforms, including
Unix and Windows NT are disclosed.
|7,373,643 B2||Apparatus, Methods and Articles of Manufacture for Data Transmission
Abstract: The present invention comprises apparatus, methods and
articles of manufacture for transferring data, comprising one or more update files made available upon distribution media, such as a server, a hash of the update files made available upon the server, as well as versions of the update and hash files upon a target or client. The distribution media then transmits the hash to the
target or client, the hashes are compared, and, if they do not match, the update files are downloaded for further review and updating, if desired. If updating is desired, an update mechanism will then edit and/or replace files, modules, data and/or byte sequences on the target, according to the preferred embodiments. Embodiments for various platforms, including Unix and Windows NT are disclosed.
|7,093,135||Software Virus Detection Methods and Apparatus
Abstract: The present invention is a system and method for identifying and securing code, as well as providing virus detection and code authentication. This detection and authentication occurs through modules or components which utilize certification identifiers to authenticate and validate code. Preferred embodiments include macro detection.
|7,143,113||Apparatus, methods and articles of manufacture for securing and maintaining computer systems and storage media
Abstract: Apparatus, methods, and articles of manufacture are claimed for securing, maintaining, monitoring and controlling computer files. Various predetermined files are hashed on the machine, providing a first data file with the file names and hash values, which data file is stored as a baseline. At desired intervals, a comparison cycle begins. A second data file is provided comprised of desired file names, which are then taken one at a time, hashed, and compared to the baseline first data file. Results are recorded as desired.
|6,779,117||Authentication Program for a Computer Operating System
Inventor Joe Welles under direction of Peter Radatti
Abstract: A Computer Authentication System, a software application which performs file authentication functions in any Microsoft Windows registry based computer operating system. The program system modifies the manner in which Microsoft Windows executes application programs.
|6,763,467 B1||Network Traffic Intercepting Method and System
Abstract: A computer system and method for intercepting, examining, and controlling data streams flowing via transport connections between the transport layer of an operating system and the user application; which operates on a single computer.
|6,721,424 B1||Hostage System and Method for Intercepting Encrypted Hostile Data
Abstract: A method for intercepting data transmissions in a system which is comprised of an external network and computers within a protected local network. A proxy server located in the communication path, between the external network and the computers, is equipped with virus detection capability and includes, also, key storage means and a hostage storage facility.
|6,338,141||Method and Apparatus for Computer Virus Detection Analysis and Removal in Real Time
Abstract: A method and apparatus for detecting computer viruses comprising the use of a collection of relational data to detect computer viruses in computer files. The collection of relational data comprises various relational signature objects created from viruses.
|Serial Number||Patents Published – Pending|
|10/831,985||Apparatus, Methods and Articles of Manufacture for
Intercepting, Examining and Controlling Code, Data
and Files and Their Transfer
|10/665,387||Apparatus and Methods for Intercepting, Examining and Controlling Code, Data and Files and Their Transfer in Instant Messaging and Peer-to-Peer Applications|
|10/404,378||Methods, Apparatus and Articles of Manufacture for Computer File Integrity and Baseline Maintenance|
|10/032,251||Apparatus, Methods and Articles of Manufacture for Securing Computer Networks|
|09/886,169||Apparatus, Methods and Articles of Manufacture for Intercepting, Examining and Controlling Code, Data and Files and Their Transfer|
|09/838,979||Software Virus Detection of Methods, Apparatus and Articles of Manufacture|
|09/800,314||Apparatus, Methods and Articles of Manufacture for Intercepting, Examining and Controlling Code, Data and Files and Their Transfer|
|09/800,173||Apparatus, Methods and Articles of Manufacture for Data Transmission|