Patents by Inventor Douglas Song

Douglas Song has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150074644
    Abstract: A system and method that include collecting device version profiles from a plurality of device sources; classifying the device version profiles into a device profile repository; receiving a component version query request; querying the device profile repository according to the version query request; and responding to the query request with results of the query.
    Type: Application
    Filed: September 10, 2014
    Publication date: March 12, 2015
    Inventors: Jon Oberheide, Douglas Song
  • Publication number: 20150046989
    Abstract: A system and method that includes receiving a first device profile and associating the first device profile with a first application instance that is assigned as an authentication device of a first account; receiving a second device profile for a second application instance, wherein the second application instance is making a request on behalf of the first account; comparing the second device profile to the first device profile; and completing the request of the second application instance according to results of comparing the second device profile and the first device profile.
    Type: Application
    Filed: August 8, 2014
    Publication date: February 12, 2015
    Inventors: Jon Oberheide, Douglas Song
  • Publication number: 20150046990
    Abstract: A system and method that includes receiving a first biometric profile and associating the first biometric profile with a first application instance that is assigned as an authentication device of a first account; receiving a second biometric profile for a second application instance, wherein the second application instance is making a request on behalf of the first account; comparing the second biometric profile to the first biometric profile; and completing the request of the second application instance according to results of comparing the second biometric profile to the first biometric profile.
    Type: Application
    Filed: August 8, 2014
    Publication date: February 12, 2015
    Inventors: Jon Oberheide, Douglas Song
  • Publication number: 20150040190
    Abstract: A system and method that include receiving a service provider identity request through a federated authentication protocol; transmitting a proxy identity request to a configured identity provider; receiving an identity assertion; facilitating execution of a second layer of authentication; determining a proxy identity assertion based on the identity assertion and the second layer of authentication; and transmitting the proxy identity assertion to the service provider.
    Type: Application
    Filed: October 17, 2014
    Publication date: February 5, 2015
    Inventors: Jon Oberheide, Douglas Song
  • Patent number: 8893230
    Abstract: A system and method that include receiving a service provider identity request through a federated authentication protocol; transmitting a proxy identity request to a configured identity provider; receiving an identity assertion; facilitating execution of a second layer of authentication; determining a proxy identity assertion based on the identity assertion and the second layer of authentication; and transmitting the proxy identity assertion to the service provider.
    Type: Grant
    Filed: February 24, 2014
    Date of Patent: November 18, 2014
    Assignee: Duo Security, Inc.
    Inventors: Jon Oberheide, Douglas Song
  • Patent number: 8893251
    Abstract: Various systems and methods of embedded authentication are described herein. One method of the preferred embodiment can include receiving at an authentication server a transaction token from a host website, the host website including an embeddable interface and prompting a user challenge by the authentication server at the embeddable interface. The method of the preferred embodiment can also include creating a signed authentication token in response to a successful user challenge, and transmitting the signed authentication token from the authentication server to the embeddable interface.
    Type: Grant
    Filed: July 29, 2013
    Date of Patent: November 18, 2014
    Assignee: Duo Security, Inc.
    Inventors: Jon Oberheide, Douglas Song, Adam Goodman
  • Patent number: 8892885
    Abstract: A system and method for authenticating a user that includes receiving an access-request of a network protocol at a challenge-response server; determining if an access-challenge message is required; delivering an active script component through a parameter of an access-challenge message of the network protocol when an access-challenge is required; receiving a challenge-response of a user; validating the challenge-response; and selectively sending an access-accept response for a valid challenge-response and sending an access-denied response for an invalid challenge-response.
    Type: Grant
    Filed: August 31, 2012
    Date of Patent: November 18, 2014
    Assignee: Duo Security, Inc.
    Inventors: Jon Oberheide, Douglas Song, Adam Goodman
  • Publication number: 20140245396
    Abstract: A system and method for providing secondary-factor authentication with a third party application that can include enrolling a device application instance of an account into a secondary-factor authentication service on behalf of a service provider that includes at the secondary-factor authentication service, receiving a secondary factor of authentication enrollment request of an account, the request received from the service provider, transmitting an activation code, and pairing the device application instance with the account through the activation code; receiving an authentication request identifying the account; transmitting an authentication request to the device application instance paired with the account; validating a response to the application request; and transmitting an assessment to the service provider.
    Type: Application
    Filed: February 24, 2014
    Publication date: August 28, 2014
    Applicant: Duo Security, Inc.
    Inventors: Jon Oberheide, Douglas Song
  • Publication number: 20140245389
    Abstract: A system and method that include receiving a service provider identity request through a federated authentication protocol; transmitting a proxy identity request to a configured identity provider; receiving an identity assertion; facilitating execution of a second layer of authentication; determining a proxy identity assertion based on the identity assertion and the second layer of authentication; and transmitting the proxy identity assertion to the service provider.
    Type: Application
    Filed: February 24, 2014
    Publication date: August 28, 2014
    Applicant: Duo Security, Inc.
    Inventors: Jon Oberheide, Douglas Song
  • Publication number: 20140245450
    Abstract: A system and method that includes identifying a vulnerability in a computing device; accessing a vulnerability exploitation mapped to the identified vulnerability; at the computing device, executing the vulnerability exploitation and entering an operating mode of escalated privileges; and while in the operating mode of escalated privileges, updating the system with a vulnerability resolution.
    Type: Application
    Filed: February 24, 2014
    Publication date: August 28, 2014
    Applicant: Duo Security, Inc.
    Inventors: Jon Oberheide, Douglas Song
  • Patent number: 8763077
    Abstract: A system and method including defining at least one device authentication policy; at a policy engine, initializing authentication policy processing for an authenticator device; collecting device status assessment; evaluating policy compliance of the device status assessment to an associated defined device authentication policy; and enforcing use of the authenticator device according to the policy compliance.
    Type: Grant
    Filed: October 8, 2012
    Date of Patent: June 24, 2014
    Assignee: Duo Security, Inc.
    Inventors: Jon Oberheide, Douglas Song, Adam Goodman
  • Publication number: 20130312078
    Abstract: Various systems and methods of embedded authentication are described herein. One method of the preferred embodiment can include receiving at an authentication server a transaction token from a host website, the host website including an embeddable interface and prompting a user challenge by the authentication server at the embeddable interface. The method of the preferred embodiment can also include creating a signed authentication token in response to a successful user challenge, and transmitting the signed authentication token from the authentication server to the embeddable interface.
    Type: Application
    Filed: July 29, 2013
    Publication date: November 21, 2013
    Applicant: Duo Security, Inc.
    Inventors: Jon Oberheide, Douglas Song, Adam Goodman
  • Publication number: 20130212387
    Abstract: A system and method for authenticating a user that includes receiving an access-request of a network protocol at a challenge-response server; determining if an access-challenge message is required; delivering an active script component through a parameter of an access-challenge message of the network protocol when an access-challenge is required; receiving a challenge-response of a user; validating the challenge-response; and selectively sending an access-accept response for a valid challenge-response and sending an access-denied response for an invalid challenge-response.
    Type: Application
    Filed: August 31, 2012
    Publication date: August 15, 2013
    Inventors: Jon Oberheide, Douglas Song, Adam Goodman
  • Patent number: 8510820
    Abstract: Various systems and methods of embedded authentication are described herein. One method of the preferred embodiment can include receiving at an authentication server a transaction token from a host website, the host website including an embeddable interface and prompting a user challenge by the authentication server at the embeddable interface. The method of the preferred embodiment can also include creating a signed authentication token in response to a successful user challenge, and transmitting the signed authentication token from the authentication server to the embeddable interface.
    Type: Grant
    Filed: December 2, 2011
    Date of Patent: August 13, 2013
    Assignee: Duo Security, Inc.
    Inventors: Jon Oberheide, Douglas Song, Adam Goodman
  • Publication number: 20120198228
    Abstract: A method according to preferred embodiment can include receiving a request at a server from a private key module associated with a first user device; directing a request for a first portion of the private key from the server to a second user device; and in response to a successful user challenge creating a first portion of a digital signature and a second portion of a digital signature at the server. The method of the preferred embodiment can further include combining the first portion of the digital signature and the second portion of the digital signature; and delivering the digital signature to the first user device. The method of the preferred embodiment can function to secure the digital signature process by splitting or dividing the user's private key into two or more portions, each of which require independent authorization from the user in order to create the digital signature.
    Type: Application
    Filed: December 20, 2011
    Publication date: August 2, 2012
    Inventors: Jon Oberheide, Douglas Song, Adam Goodman
  • Publication number: 20120198535
    Abstract: Various systems and methods of embedded authentication are described herein. One method of the preferred embodiment can include receiving at an authentication server a transaction token from a host website, the host website including an embeddable interface and prompting a user challenge by the authentication server at the embeddable interface. The method of the preferred embodiment can also include creating a signed authentication token in response to a successful user challenge, and transmitting the signed authentication token from the authentication server to the embeddable interface.
    Type: Application
    Filed: December 2, 2011
    Publication date: August 2, 2012
    Inventors: Jon Oberheide, Douglas Song, Adam Goodman
  • Publication number: 20110219230
    Abstract: A method including registering an authority device for an account on an auth platform; receiving transaction request from an initiator to the auth platform; messaging the authority device with the transaction request; receiving an authority agent response from the authority device to the auth platform; if the authority agent response confirms the transaction, communicating a confirmed transaction to the initiator; and if the authority agent response denies the transaction, communicating a denied transaction to the initiator.
    Type: Application
    Filed: March 2, 2011
    Publication date: September 8, 2011
    Inventors: Jon Oberheide, Douglas Song, Adam Goodman
  • Publication number: 20060289004
    Abstract: The present invention is directed to an air purifying escape hood that protects a user from acute environmental hazards by filtering contaminants and providing breathable air for a time sufficient to escape the hazard. The air purifying escape hood comprises a hood assembly that covers the head of the user and a filter assembly that filters contaminants and provides a flow of purified air to a user. The air purifying escape hood is particularly useful in protecting a user from smoke, allowing the user to safely escape a burning building and is further useful for protection against non-smoke related particulates, chemical and biological contaminants, and radiological/nuclear contaminants.
    Type: Application
    Filed: June 20, 2005
    Publication date: December 28, 2006
    Inventors: Manuel Saez, Lachezar Tsvetanov, Maximo Heer, Matthew Chin, Dean Chapman, Douglas Song
  • Publication number: 20050216956
    Abstract: Technique for protecting a communications network, such a computer network, from attack such as self-propagating code violations of security policies, in which the network is divided into “compartments” that are separated by access control devices such as firewalls. The access control devices are then used to stop the spread of self-propagating attack code, the “zero-day” worms, for example. However, the access control devices are configured such that upon activation legitimate in-use network services will not be jeopardized.
    Type: Application
    Filed: July 8, 2004
    Publication date: September 29, 2005
    Applicant: Arbor Networks, Inc.
    Inventors: Douglas Orr, Thomas Ptacek, Douglas Song
  • Publication number: 20050005017
    Abstract: Technique for protecting a communications network, such a computer network, from attack such as self-propagating code violations of security policies, in which the network is divided into “compartments” that are separated by access control devices such as firewalls. The access control devices are then used to stop the spread of self-propagating attack code, the “zero-day” worms, for example. However, the access control devices are configured such that upon activation legitimate in-use network services will not be jeopardized.
    Type: Application
    Filed: October 14, 2003
    Publication date: January 6, 2005
    Applicant: Arbor Networks, Inc.
    Inventors: Thomas Ptacek, Douglas Song, Jose Nazario