26 patents
Utility
Personalized Secure Communication Session Management
16 Nov 23
The techniques herein are directed generally to personalized secure communication session management, such as for virtual private networks (VPNs).
Michael Joseph Frendo, Robert Taylor Bartlett, Alexander John Shockley, James M. Behmke
Filed: 6 Jul 23
Utility
Controlling transmission of information through a zero-knowledge data management network
10 Oct 23
The techniques herein are directed generally to a “zero-knowledge” data management network.
Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
Filed: 18 Aug 22
Utility
Generating reports from information within a zero-knowledge data management network
3 Oct 23
The techniques herein are directed generally to a “zero-knowledge” data management network.
Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
Filed: 4 Dec 19
Utility
Receiving a Reason for a Call at a User Device
21 Sep 23
In one embodiment, the techniques herein are directed to receiving a reason for a call at a user device.
Michael Joseph Frendo, Alexander John Shockley, Brett Shockley, Robert Taylor Bartlett, Shmuel Shaffer
Filed: 22 Feb 23
Utility
Storing Encrypted Data for Access by a Trusted Device
7 Sep 23
In one embodiment, a method herein may comprise: receiving, at a first device, an encrypted private key of a second device encrypted using a public key of the first device, wherein the second device encrypted data into encrypted data using a public key of the second device and stored the encrypted data on a storage server; and decrypting, by the first device, a private key of the second device from the encrypted private key using a private key of the first device; and accessing, by the first device, the encrypted data on the storage server by utilizing the private key of the second device.
Shmuel Shaffer, Michael Joseph Frendo, Brett Shockley
Filed: 22 Feb 23
Utility
Accessing Encrypted Information with a Trusted Device
7 Sep 23
In one embodiment, a method herein may comprise: receiving, at a first device, an encrypted private key of a second device encrypted using a public key of the first device, wherein the second device encrypts data into encrypted data using a public key of the second device and stored the encrypted data on a storage server: and decrypting, by the first device, a private key of the second device from the encrypted private key using a private key of the first device; and accessing, by the first device, the encrypted data on the storage server by utilizing the private key of die second device.
Shmuel SHAFFER, Michael Joseph FRENDO, Brett SHOCKLEY
Filed: 22 Feb 23
Utility
Conveying a Reason for a Call to a User Device
7 Sep 23
In one embodiment, a method herein may comprise: identifying, by an initiating device of an organization, a user and a reason for a call to a recipient device of the user, the recipient device having an inbound phone number; informing an intermediate service about the call to the recipient device and the reason for the call, wherein the intermediate service coordinates with an application on the recipient device to inform the recipient device of the call, an outbound phone number of the call, a name of the organization, and the reason for the call; and calling, using the outbound phone number, the recipient device at the inbound phone number, wherein the application on the recipient device has configured a caller identification process on the recipient device to display, in response to receiving the call from the outbound phone number, the name of the organization and the reason for the call.
Michael Joseph FRENDO, Alexander John SHOCKLEY, Brett SHOCKLEY, Robert Taylor BARTLETT, Shmuel SHAFFER
Filed: 22 Feb 23
Utility
Coordinating Conveying a Reason for a Call from a User Device
7 Sep 23
In one embodiment, the techniques herein are directed to coordinating conveying a reason for a call from a user device.
Michael Joseph Frendo, Alexander John Shockley, Brett Shockley, Robert Taylor Bartlett, Shmuel Shaffer
Filed: 22 Feb 23
Utility
Coordinating Conveying a Reason for a Call to a User Device
31 Aug 23
In one embodiment, an intermediate service device: receives information about a call to be made from an initiating device to a recipient device of a user, the information including a reason for the call; and coordinates with an application on the recipient device to inform the recipient device of the call, an outbound phone number of the call, a name of an organization of the initiating device, and the reason for the call, wherein the application on the recipient device configures a caller identification process on the recipient device to display, in response to receiving a subsequent call from the outbound phone number, the name of the organization and the reason for the call.
Michael Joseph Frendo, Alexander John SHOCKLEY, Brett SHOCKLEY, Robert Taylor BARTLETT, Shmuel SHAFFER
Filed: 22 Feb 23
Utility
Receiving a Reason for a Call from a User Device
31 Aug 23
In one embodiment, the techniques herein are directed to receiving a reason for a call from a user device.
Michael Joseph Frendo, Alexander John Shockley, Brett Shockley, Robert Taylor Bartlett, Shmuel Shaffer
Filed: 22 Feb 23
Utility
Conveying a Reason for a Call from a User Device
31 Aug 23
In one embodiment, the techniques herein are directed to conveying a reason for a call from a user device.
Michael Joseph Frendo, Alexander John SHOCKLEY, Brett SHOCKLEY, Robert Taylor BARTLETT, Shmuel SHAFFER
Filed: 22 Feb 23
Utility
Personalized secure communication session management
22 Aug 23
The techniques herein are directed generally to personalized secure communication session management, such as for virtual private networks (VPNs).
Michael Joseph Frendo, Robert Taylor Bartlett, Alexander John Shockley, James M. Behmke
Filed: 12 Mar 21
Utility
Providing access control and persona validation for interactions
4 Jul 23
The techniques herein are directed generally to providing access control and persona validation for interactions.
Shmuel Shaffer, Yolanda Schwartz, Alexander John Shockley, Moni Manor, James M. Behmke
Filed: 28 Aug 20
Utility
Providing access control and identity verification for communications when receiving a communication at an entity to be verified
25 Apr 23
The techniques herein are directed generally to providing access control and identity verification for communications when receiving a communication at an entity to be verified.
Shmuel Shaffer, Yolanda Schwartz, Alexander John Shockley
Filed: 29 Apr 20
Utility
Passively Qualifying Contacts
20 Apr 23
The techniques herein are directed generally to methods and apparatus for automatically classifying interactions with contact center, identifying contacts as being initiated by one of a normal user, a malicious actor, an inexperienced user, or a new type of a user, and invoking mitigation actions such as forwarding the caller to a dedicated agent group based on the identification.
Shmuel Shaffer, Brett Shockley
Filed: 18 Oct 22
Utility
Secured Private Credential Certificate
8 Dec 22
The techniques herein are directed generally to a secured private credential certificate, such as for vaccination certificates.
Shmuel Shaffer, Alexander John Shockley
Filed: 2 Jun 21
Utility
Controlling Transmission of Information Through a Zero-knowledge Data Management Network
8 Dec 22
The techniques herein are directed generally to a “zero-knowledge” data management network.
Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
Filed: 18 Aug 22
Utility
Personalized Secure Communication Session Management
15 Sep 22
The techniques herein are directed generally to personalized secure communication session management, such as for virtual private networks (VPNs).
Michael Joseph Frendo, Robert Taylor Bartlett, Alexander John Shockley, James M. Behmke
Filed: 12 Mar 21
Utility
Controlling transmission of information through a zero-knowledge data management network
13 Sep 22
The techniques herein are directed generally to a “zero-knowledge” data management network.
Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
Filed: 4 Dec 19
Utility
Storing Information Within a Zero-knowledge Data Management Network
1 Sep 22
The techniques herein are directed generally to a “zero-knowledge” data management network.
Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
Filed: 20 May 22