Dehaas
Dennis M. Dehaas, Hanford, CA US
Patent application number | Description | Published |
---|---|---|
20090107446 | Apparatus for the operation of a work object - An apparatus for the operation of a work object, in which the work object has a chamber adapted to receive a work material for the performance of an operation of the work material and converting the work material into a resulting substance and the apparatus has a first passage adapted to supply the work material to the chamber; a second passage adapted to release the resulting substance from the chamber; and a pair of slideable members individually moveable relative to the first passage and the second passage to control the operation in the chamber. | 04-30-2009 |
Drew Christian Dehaas, Ithaca, NY US
Patent application number | Description | Published |
---|---|---|
20160026791 | SYSTEMS AND/OR METHODS FOR AUTOMATICALLY PROTECTING AGAINST MEMORY CORRUPTION VULNERABILITIES - Certain example embodiments described herein relate to techniques for automatically protecting, or hardening, software against exploits of memory-corruption vulnerabilities. The techniques include arranging a plurality of guard regions in the memory in relation to data objects formed by the application program, identifying an access by the application program to a guard region arranged in the memory as a disallowed access, and modifying the execution of the application program in response to the identifying, the modifying being in order to prevent exploitation of the memory and/or to correctly execute the application program. | 01-28-2016 |
Ralph Dehaas, Easton, PA US
Ronald Dehaas, Owosso, MI US
Patent application number | Description | Published |
---|---|---|
20160119211 | TUNNELED MONITORING SERVICE AND METHOD - Some embodiments provide systems and methods to monitor network communications, comprising: a computing device comprising a control circuit and memory with instructions executed by the control circuit to implement: a tunneled monitoring service (TMS) operated local on the mobile computing device; and a tunnel protocol within the mobile computing device that is configured to establish a tunnel interface between software applications and the TMS, wherein the tunnel interface is configured to collect output data transactions, communicated by the software applications, and direct the output data transactions to the TMS; wherein the TMS is configured to initiate a monitoring of each output data transaction relative to predefined criteria to identify relevant parameter information, obtained from one or more of the output data transactions, that have a predefined relationship with one or more of the criteria, and cause results of the monitoring relative to the criteria to be recorded. | 04-28-2016 |
Ronald J. Dehaas, Corunna, MI US
Patent application number | Description | Published |
---|---|---|
20090195445 | SYSTEM AND METHOD FOR SELECTING PARAMETERS BASED ON PHYSICAL LOCATION OF A COMPUTER DEVICE - A system to predefine multiple allowed activities of a wireless computing device based on geographic location and, specifically, for security parameters associated with wireless access of such devices. Wireless access can be controlled on a movable computing device by ascertaining a geographic location of computing device, using a position sensing device; coupling motion sensing device with computing device; determining whether geographic location is within a predefined zone; and generating a command for controlling wireless access in response to determining. Commands can be derived from a predetermined table of allowed wireless activities in a geographically defined area and, specifically, for security parameters associated with the computing device. Wireless activities can include Internet protocols, instant messaging, email, and newsgroups. The commands can include blocking all wireless access, restricting file sharing, restricting Internet access, restricting email, restricting newsgroups, restricting instant messaging, and generating reports. | 08-06-2009 |
Ronald J. Dehaas, Owosso, MI US
Patent application number | Description | Published |
---|---|---|
20090178134 | SYSTEM AND METHOD FOR BLOCKING INTERNET ACCESS AND/OR APPLICATIONS - The present invention generally relates to a system and method for selectively blocking computer application access and, specifically, to a system and method for blocking Internet access and/or applications when a specified string of characters is entered from a keyboard or other input device. Specifically in one embodiment is provided a system for selectively blocking computer application access of a selected user, which includes a blocking program configured to monitor keystrokes of said user, a predefined database of keystrokes, the program continuously monitoring said user keystrokes and comparing them to said database of keystrokes, and a predefined action when said user keystrokes match said database keystrokes. The predefined action can be to block Internet access or terminate an Internet connection, or Internet protocol, or computer application. | 07-09-2009 |
20120303803 | CONT Internet Use Monitoring System - A system for monitoring Internet use of a selected computer user includes a remote server and a computer having a monitoring program voluntarily installed thereon by the user communicatively connected to the remote server. The monitoring program is configured to monitor various Internet access activity of the computer user and record the Internet access activity on the remote server. The Internet access activity includes access of at least one Internet protocol from the group consisting of newsgroups, file sharing programs, file transfer programs, chat rooms, peer to peer chats, and electronic mail activity. A method of using a monitoring system includes the steps of a computer user voluntarily installing a monitoring program on a selected computer, recording the Internet access activity, and providing the recorded information to a third party recipient. A report may be provided that includes a variety of information and may include a plurality of portions. | 11-29-2012 |
20140149588 | INTERNET USE MONITORING SYSTEM AND METHOD - A system for monitoring Internet use of a selected computer user includes a remote server and a computer having a monitoring program voluntarily installed thereon by the user communicatively connected to the remote server. The monitoring program is configured to monitor various Internet access activity of the computer user and record the Internet access activity on the remote server. The Internet access activity includes access of at least one Internet protocol from the group consisting of newsgroups, file sharing programs, file transfer programs, chat rooms, peer to peer chats, and electronic mail activity. A method of using a monitoring system includes the steps of a computer user voluntarily installing a monitoring program on a selected computer, recording the Internet access activity, and providing the recorded information to a third party recipient. A report may be provided that includes a variety of information and may include a plurality of portions. | 05-29-2014 |