Patents by Inventor Edward C. Giaimo, III

Edward C. Giaimo, III has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10922436
    Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums for securing biometric data using distance-preserving transformations. A distance-preserving transformation is a function which maps elements to the same or another metric space such that the distance between the elements in the new metric space is equal to the distance between the elements in the original metric space.
    Type: Grant
    Filed: August 7, 2018
    Date of Patent: February 16, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amer A. Hassan, Edward C. Giaimo, III
  • Publication number: 20210021372
    Abstract: Disclosed are systems, methods, and non-transitory computer-readable media for improved data transmissions using puncturing and error correction encoding. A decoder receives an encoded data input that includes a set of individual values. The decoder performing a puncturing of the encoded data input, yielding a punctured encoded data input that includes a subset of the individual values from the set of individual values. The decoder determines whether the punctured encoded data input maps to any predetermined data outputs from a set of predetermined data outputs, and in response to determining that the punctured encoded data input maps to a predetermined data output from the set of predetermined data outputs, the decoder determines that the encoded data input corresponds to the predetermined data output.
    Type: Application
    Filed: July 17, 2019
    Publication date: January 21, 2021
    Inventors: Amer Aref Hassan, Edward C. Giaimo, III, Russell Andrew Penar
  • Publication number: 20210021420
    Abstract: Disclosed are systems, methods, and non-transitory computer-readable media for secure authentication using puncturing. An authentication system receives an encoded obfuscated authentication credential as part of an authentication request and accesses a stored authentication credential. The authentication system performs a puncturing of the encoded obfuscated authentication credential. The resulting punctured authentication credential includes a subset of individual values from the encoded obfuscated authentication credential. The authentication determines whether the punctured encoded data input corresponds to at least a portion of the stored authentication credential. In response to determining that the punctured encoded data input corresponds to at least a portion of the stored authentication credential, the authentication system approves the authentication request.
    Type: Application
    Filed: July 17, 2019
    Publication date: January 21, 2021
    Inventors: Amer Aref Hassan, Edward C. Giaimo, III, Russell Andrew Penar
  • Patent number: 10860840
    Abstract: A computing device stores an acquired image as a transient image template when there is a failure in an image-based authentication of the acquired image and the user of the computing device has provided user credentials that authorize the user to access the computing device. The transient image template may be used to further authorize the user to access the computing device during a predetermined time period. At the expiration of the predetermined time period, the computing device deletes the transient image template. The computing device then reverts to using a baseline image template for performing image-based authentication of the user. The transient image template may also be associated with a location such that the computing device uses the transient image template for image-based authentication when the computing device is at or near the location.
    Type: Grant
    Filed: November 14, 2018
    Date of Patent: December 8, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amer A. Hassan, Edward C. Giaimo, III
  • Patent number: 10853628
    Abstract: A computing device stores an acquired image as a transient image template when there is a failure in an image-based authentication of the acquired image and the user of the computing device has provided user credentials that authorize the user to access the computing device. The transient image template may be used to further authorize the user to access the computing device during a predetermined time period. At the expiration of the predetermined time period, the computing device deletes the transient image template. The computing device then reverts to using a baseline image template for performing image-based authentication of the user. The transient image template may also be associated with a location such that the computing device uses the transient image template for image-based authentication when the computing device is at or near the location.
    Type: Grant
    Filed: November 14, 2018
    Date of Patent: December 1, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amer A. Hassan, Carlos A. Perez Nafarrate, Edward C. Giaimo, III
  • Patent number: 10853609
    Abstract: A hybrid two-dimensional barcode reader decodes control features of the hybrid-two-dimensional barcode image, the control features corresponding to control features of a first formatting standard. The hybrid two-dimensional barcode reader extracts a data sequence from a data portion of the hybrid two-dimensional barcode image based on the decoded control features and a second data format different from a first data format of the first formatting standard to recover the first data set. The hybrid two-dimensional barcode reader may decode a second data set from the data portion of the two-dimensional barcode in the data encoding format of the first formatting standard. The hybrid two-dimensional barcode reader may also constellation decode the first data set.
    Type: Grant
    Filed: March 12, 2019
    Date of Patent: December 1, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amer Aref Hassan, Whitney Janice Giaimo, Edward C. Giaimo, III
  • Publication number: 20200304497
    Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums for securing biometric data using an encryption technique that does not require key storage or distribution. In some examples, a first biometric template of a user is input into a function that selects or determines parameters (such as an encryption key) of an encryption function that is then used to encrypt a second biometric template of the user.
    Type: Application
    Filed: June 10, 2020
    Publication date: September 24, 2020
    Inventors: Amer Aref Hassan, Edward C. Giaimo, III
  • Publication number: 20200293733
    Abstract: A hybrid two-dimensional barcode reader decodes control features of the hybrid-two-dimensional barcode image, the control features corresponding to control features of a first formatting standard. The hybrid two-dimensional barcode reader extracts a data sequence from a data portion of the hybrid two-dimensional barcode image based on the decoded control features and a second data format different from a first data format of the first formatting standard to recover the first data set. The hybrid two-dimensional barcode reader may decode a second data set from the data portion of the two-dimensional barcode in the data encoding format of the first formatting standard. The hybrid two-dimensional barcode reader may also constellation decode the first data set.
    Type: Application
    Filed: March 12, 2019
    Publication date: September 17, 2020
    Inventors: Amer Aref Hassan, Whitney Janice Giaimo, Edward C. Giaimo, III
  • Publication number: 20200272716
    Abstract: Systems and methods may be used to authenticate a user using a first device (e.g., a collaboration device) and a second device (e.g., a device proximate to the collaboration device) For example, the first device may compare an authentication image of a user (captured by the second device) to an image captured by the first device (for example at a lower resolution or with a partial view). The user may be authenticated by the first device in response to identifying the user from the authentication image (e.g., by matching the authentication image to a reference image of the user) and determining a correlation between the authentication image and the captured image.
    Type: Application
    Filed: February 21, 2019
    Publication date: August 27, 2020
    Inventors: Amer A. Hassan, Edward C. Giaimo, III
  • Patent number: 10756817
    Abstract: Disclosed in some examples, are optical devices, systems, and machine-readable mediums that send and receive multiple streams of data across a same optical communication path (e.g., a same fiber optic fiber) with a same wavelength using different light sources transmitting at different power levels—thereby increasing the bandwidth of each optical communication path. Each light source corresponding to each stream transmits at a same frequency and on the same optical communication path using a different power level. The receiver differentiates the data for each stream by applying one or more detection models to the photon counts observed at the receiver to determine likely bit assignments for each stream.
    Type: Grant
    Filed: April 18, 2019
    Date of Patent: August 25, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amer Aref Hassan, Edward C. Giaimo, III
  • Publication number: 20200151431
    Abstract: A computing device stores an acquired image as a transient image template when there is a failure in an image-based authentication of the acquired image and the user of the computing device has provided user credentials that authorize the user to access the computing device. The transient image template may be used to further authorize the user to access the computing device during a predetermined time period. At the expiration of the predetermined time period, the computing device deletes the transient image template. The computing device then reverts to using a baseline image template for performing image-based authentication of the user. The transient image template may also be associated with a location such that the computing device uses the transient image template for image-based authentication when the computing device is at or near the location.
    Type: Application
    Filed: November 14, 2018
    Publication date: May 14, 2020
    Inventors: Amer A. Hassan, Carlos A. Perez Nafarrate, Edward C. Giaimo, III
  • Publication number: 20200151430
    Abstract: A computing device stores an acquired image as a transient image template when there is a failure in an image-based authentication of the acquired image and the user of the computing device has provided user credentials that authorize the user to access the computing device. The transient image template may be used to further authorize the user to access the computing device during a predetermined time period. At the expiration of the predetermined time period, the computing device deletes the transient image template. The computing device then reverts to using a baseline image template for performing image-based authentication of the user. The transient image template may also be associated with a location such that the computing device uses the transient image template for image-based authentication when the computing device is at or near the location.
    Type: Application
    Filed: November 14, 2018
    Publication date: May 14, 2020
    Inventors: Amer A. Hassan, Edward C. Giaimo, III
  • Patent number: 10650208
    Abstract: A two-dimensional barcode encoder generates the hybrid two-dimensional barcode image that has control features corresponding to control features of a first formatting standard. The barcode encoder encodes a first data set in a data portion of the two-dimensional barcode in a second format that is different from a data encoding format of the first formatting standard. The encoder may also encode a second data set in the data portion of the two-dimensional barcode in the data encoding format of the first formatting standard. The encoder may also constellation encode the first data set.
    Type: Grant
    Filed: March 12, 2019
    Date of Patent: May 12, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amer Aref Hassan, Whitney Janice Giaimo, Edward C. Giaimo, III
  • Publication number: 20200134166
    Abstract: Methods and systems for authenticating a user account based on a password are disclosed. In one aspect, a method includes receiving input defining a sequence of characters included in an entered password, ignoring characters between a first position in the sequence of characters and a second position in the sequence of characters, and validating the password based on non-ignored characters in the sequence of characters.
    Type: Application
    Filed: October 31, 2018
    Publication date: April 30, 2020
    Inventors: Amer A. Hassan, Edward C. Giaimo, III, Wei-Chen Chen
  • Publication number: 20200081510
    Abstract: Examples are disclosed that relate to power supply devices and methods for managing DC power. In one example, a method comprises: providing DC power at a first voltage until determining that a standby time period has elapsed; determining that a load is connected to the power supply device; and based on determining that the standby time period has elapsed, entering a restricted power mode, wherein the restricted power mode comprises either: deactivating the DC power, or (1) providing the DC power at a second voltage until determining that a load detection time period has elapsed, (2) deactivating the DC power after determining that the load detection time period has elapsed, and (3) repeating (1) and (2) until determining that the load is no longer connected to the power supply device.
    Type: Application
    Filed: September 10, 2018
    Publication date: March 12, 2020
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Chee Kiong FONG, Geoffrey Jason SHEW, Gary Alan TORNQUIST, Edward C. GIAIMO, III, Richard F. JOHNSON, Tim R. CALLAND
  • Publication number: 20200050794
    Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums for securing biometric data using distance-preserving transformations. A distance-preserving transformation is a function which maps elements to the same or another metric space such that the distance between the elements in the new metric space is equal to the distance between the elements in the original metric space.
    Type: Application
    Filed: August 7, 2018
    Publication date: February 13, 2020
    Inventors: Amer A. Hassan, Edward C. Giaimo, III
  • Publication number: 20200053076
    Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums for securing biometric data using an encryption technique that does not require key storage or distribution. In some examples, a first biometric template of a user is input into a function that selects or determines parameters (such as an encryption key) of an encryption function that is then used to encrypt a second biometric template of the user.
    Type: Application
    Filed: August 7, 2018
    Publication date: February 13, 2020
    Inventors: Amer A. Hassan, Edward C. Giaimo, III
  • Patent number: 10447338
    Abstract: A spreading sequence generator for a first radio frequency (RF) transceiver receives an RF signal from a second RF transceiver. The first RF transceiver measures power levels of the received RF signal at a plurality of instants to generate respective digital power level values and uses the plurality of digital power level values to create a first spreading sequence. The second RF transceiver receives an RF signal from the first RF transceiver and performs the same functions to create a second spreading sequence. Due to the reciprocal nature of the RF channel between the first and second RF transceivers, the first and second cryptographic keys match.
    Type: Grant
    Filed: June 19, 2018
    Date of Patent: October 15, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amer A. Hassan, Edward C. Giaimo, III, Paul Mitchell
  • Publication number: 20180309476
    Abstract: A spreading sequence generator for a first radio frequency (RF) transceiver receives an RF signal from a second RF transceiver. The first RF transceiver measures power levels of the received RF signal at a plurality of instants to generate respective digital power level values and uses the plurality of digital power level values to create a first spreading sequence. The second RF transceiver receives an RF signal from the first RF transceiver and performs the same functions to create a second spreading sequence. Due to the reciprocal nature of the RF channel between the first and second RF transceivers, the first and second cryptographic keys match.
    Type: Application
    Filed: June 19, 2018
    Publication date: October 25, 2018
    Inventors: Amer A. Hassan, Edward C. Giaimo, III, Paul Mitchell
  • Patent number: 10063156
    Abstract: A leakage reduction circuit is described herein that is configured to reduce high voltage leakage that may occur in electrical power step-down scenarios. The leakage reduction circuit, for instance, may be employed in a power adapter for a client device, such as a mobile computing device. For example, a power adapter may include a high voltage alternating current (AC) input, and circuitry for converting the AC input into lower voltage direct current (DC) for output to a client device. Implementations of the disclosed leakage reduction circuit include an arrangement of capacitors that provides a noise return path (e.g., for common mode noise) in a power adapter, while reducing high voltage leakage that may occur from a high voltage AC input to a lower voltage DC output of the power adapter.
    Type: Grant
    Filed: March 27, 2014
    Date of Patent: August 28, 2018
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Chee Kiong Fong, David Richard Perchilk, Suet Fong Tin, Michael Donovan Rulien, Perry Samuel Stultz, Edward C. Giaimo, III