Patents by Inventor Edward C. Giaimo, III
Edward C. Giaimo, III has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10922436Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums for securing biometric data using distance-preserving transformations. A distance-preserving transformation is a function which maps elements to the same or another metric space such that the distance between the elements in the new metric space is equal to the distance between the elements in the original metric space.Type: GrantFiled: August 7, 2018Date of Patent: February 16, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Amer A. Hassan, Edward C. Giaimo, III
-
Publication number: 20210021372Abstract: Disclosed are systems, methods, and non-transitory computer-readable media for improved data transmissions using puncturing and error correction encoding. A decoder receives an encoded data input that includes a set of individual values. The decoder performing a puncturing of the encoded data input, yielding a punctured encoded data input that includes a subset of the individual values from the set of individual values. The decoder determines whether the punctured encoded data input maps to any predetermined data outputs from a set of predetermined data outputs, and in response to determining that the punctured encoded data input maps to a predetermined data output from the set of predetermined data outputs, the decoder determines that the encoded data input corresponds to the predetermined data output.Type: ApplicationFiled: July 17, 2019Publication date: January 21, 2021Inventors: Amer Aref Hassan, Edward C. Giaimo, III, Russell Andrew Penar
-
Publication number: 20210021420Abstract: Disclosed are systems, methods, and non-transitory computer-readable media for secure authentication using puncturing. An authentication system receives an encoded obfuscated authentication credential as part of an authentication request and accesses a stored authentication credential. The authentication system performs a puncturing of the encoded obfuscated authentication credential. The resulting punctured authentication credential includes a subset of individual values from the encoded obfuscated authentication credential. The authentication determines whether the punctured encoded data input corresponds to at least a portion of the stored authentication credential. In response to determining that the punctured encoded data input corresponds to at least a portion of the stored authentication credential, the authentication system approves the authentication request.Type: ApplicationFiled: July 17, 2019Publication date: January 21, 2021Inventors: Amer Aref Hassan, Edward C. Giaimo, III, Russell Andrew Penar
-
Patent number: 10860840Abstract: A computing device stores an acquired image as a transient image template when there is a failure in an image-based authentication of the acquired image and the user of the computing device has provided user credentials that authorize the user to access the computing device. The transient image template may be used to further authorize the user to access the computing device during a predetermined time period. At the expiration of the predetermined time period, the computing device deletes the transient image template. The computing device then reverts to using a baseline image template for performing image-based authentication of the user. The transient image template may also be associated with a location such that the computing device uses the transient image template for image-based authentication when the computing device is at or near the location.Type: GrantFiled: November 14, 2018Date of Patent: December 8, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Amer A. Hassan, Edward C. Giaimo, III
-
Patent number: 10853628Abstract: A computing device stores an acquired image as a transient image template when there is a failure in an image-based authentication of the acquired image and the user of the computing device has provided user credentials that authorize the user to access the computing device. The transient image template may be used to further authorize the user to access the computing device during a predetermined time period. At the expiration of the predetermined time period, the computing device deletes the transient image template. The computing device then reverts to using a baseline image template for performing image-based authentication of the user. The transient image template may also be associated with a location such that the computing device uses the transient image template for image-based authentication when the computing device is at or near the location.Type: GrantFiled: November 14, 2018Date of Patent: December 1, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Amer A. Hassan, Carlos A. Perez Nafarrate, Edward C. Giaimo, III
-
Patent number: 10853609Abstract: A hybrid two-dimensional barcode reader decodes control features of the hybrid-two-dimensional barcode image, the control features corresponding to control features of a first formatting standard. The hybrid two-dimensional barcode reader extracts a data sequence from a data portion of the hybrid two-dimensional barcode image based on the decoded control features and a second data format different from a first data format of the first formatting standard to recover the first data set. The hybrid two-dimensional barcode reader may decode a second data set from the data portion of the two-dimensional barcode in the data encoding format of the first formatting standard. The hybrid two-dimensional barcode reader may also constellation decode the first data set.Type: GrantFiled: March 12, 2019Date of Patent: December 1, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Amer Aref Hassan, Whitney Janice Giaimo, Edward C. Giaimo, III
-
Publication number: 20200304497Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums for securing biometric data using an encryption technique that does not require key storage or distribution. In some examples, a first biometric template of a user is input into a function that selects or determines parameters (such as an encryption key) of an encryption function that is then used to encrypt a second biometric template of the user.Type: ApplicationFiled: June 10, 2020Publication date: September 24, 2020Inventors: Amer Aref Hassan, Edward C. Giaimo, III
-
Publication number: 20200293733Abstract: A hybrid two-dimensional barcode reader decodes control features of the hybrid-two-dimensional barcode image, the control features corresponding to control features of a first formatting standard. The hybrid two-dimensional barcode reader extracts a data sequence from a data portion of the hybrid two-dimensional barcode image based on the decoded control features and a second data format different from a first data format of the first formatting standard to recover the first data set. The hybrid two-dimensional barcode reader may decode a second data set from the data portion of the two-dimensional barcode in the data encoding format of the first formatting standard. The hybrid two-dimensional barcode reader may also constellation decode the first data set.Type: ApplicationFiled: March 12, 2019Publication date: September 17, 2020Inventors: Amer Aref Hassan, Whitney Janice Giaimo, Edward C. Giaimo, III
-
Publication number: 20200272716Abstract: Systems and methods may be used to authenticate a user using a first device (e.g., a collaboration device) and a second device (e.g., a device proximate to the collaboration device) For example, the first device may compare an authentication image of a user (captured by the second device) to an image captured by the first device (for example at a lower resolution or with a partial view). The user may be authenticated by the first device in response to identifying the user from the authentication image (e.g., by matching the authentication image to a reference image of the user) and determining a correlation between the authentication image and the captured image.Type: ApplicationFiled: February 21, 2019Publication date: August 27, 2020Inventors: Amer A. Hassan, Edward C. Giaimo, III
-
Patent number: 10756817Abstract: Disclosed in some examples, are optical devices, systems, and machine-readable mediums that send and receive multiple streams of data across a same optical communication path (e.g., a same fiber optic fiber) with a same wavelength using different light sources transmitting at different power levels—thereby increasing the bandwidth of each optical communication path. Each light source corresponding to each stream transmits at a same frequency and on the same optical communication path using a different power level. The receiver differentiates the data for each stream by applying one or more detection models to the photon counts observed at the receiver to determine likely bit assignments for each stream.Type: GrantFiled: April 18, 2019Date of Patent: August 25, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Amer Aref Hassan, Edward C. Giaimo, III
-
Publication number: 20200151431Abstract: A computing device stores an acquired image as a transient image template when there is a failure in an image-based authentication of the acquired image and the user of the computing device has provided user credentials that authorize the user to access the computing device. The transient image template may be used to further authorize the user to access the computing device during a predetermined time period. At the expiration of the predetermined time period, the computing device deletes the transient image template. The computing device then reverts to using a baseline image template for performing image-based authentication of the user. The transient image template may also be associated with a location such that the computing device uses the transient image template for image-based authentication when the computing device is at or near the location.Type: ApplicationFiled: November 14, 2018Publication date: May 14, 2020Inventors: Amer A. Hassan, Carlos A. Perez Nafarrate, Edward C. Giaimo, III
-
Publication number: 20200151430Abstract: A computing device stores an acquired image as a transient image template when there is a failure in an image-based authentication of the acquired image and the user of the computing device has provided user credentials that authorize the user to access the computing device. The transient image template may be used to further authorize the user to access the computing device during a predetermined time period. At the expiration of the predetermined time period, the computing device deletes the transient image template. The computing device then reverts to using a baseline image template for performing image-based authentication of the user. The transient image template may also be associated with a location such that the computing device uses the transient image template for image-based authentication when the computing device is at or near the location.Type: ApplicationFiled: November 14, 2018Publication date: May 14, 2020Inventors: Amer A. Hassan, Edward C. Giaimo, III
-
Patent number: 10650208Abstract: A two-dimensional barcode encoder generates the hybrid two-dimensional barcode image that has control features corresponding to control features of a first formatting standard. The barcode encoder encodes a first data set in a data portion of the two-dimensional barcode in a second format that is different from a data encoding format of the first formatting standard. The encoder may also encode a second data set in the data portion of the two-dimensional barcode in the data encoding format of the first formatting standard. The encoder may also constellation encode the first data set.Type: GrantFiled: March 12, 2019Date of Patent: May 12, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Amer Aref Hassan, Whitney Janice Giaimo, Edward C. Giaimo, III
-
Publication number: 20200134166Abstract: Methods and systems for authenticating a user account based on a password are disclosed. In one aspect, a method includes receiving input defining a sequence of characters included in an entered password, ignoring characters between a first position in the sequence of characters and a second position in the sequence of characters, and validating the password based on non-ignored characters in the sequence of characters.Type: ApplicationFiled: October 31, 2018Publication date: April 30, 2020Inventors: Amer A. Hassan, Edward C. Giaimo, III, Wei-Chen Chen
-
Publication number: 20200081510Abstract: Examples are disclosed that relate to power supply devices and methods for managing DC power. In one example, a method comprises: providing DC power at a first voltage until determining that a standby time period has elapsed; determining that a load is connected to the power supply device; and based on determining that the standby time period has elapsed, entering a restricted power mode, wherein the restricted power mode comprises either: deactivating the DC power, or (1) providing the DC power at a second voltage until determining that a load detection time period has elapsed, (2) deactivating the DC power after determining that the load detection time period has elapsed, and (3) repeating (1) and (2) until determining that the load is no longer connected to the power supply device.Type: ApplicationFiled: September 10, 2018Publication date: March 12, 2020Applicant: Microsoft Technology Licensing, LLCInventors: Chee Kiong FONG, Geoffrey Jason SHEW, Gary Alan TORNQUIST, Edward C. GIAIMO, III, Richard F. JOHNSON, Tim R. CALLAND
-
Publication number: 20200050794Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums for securing biometric data using distance-preserving transformations. A distance-preserving transformation is a function which maps elements to the same or another metric space such that the distance between the elements in the new metric space is equal to the distance between the elements in the original metric space.Type: ApplicationFiled: August 7, 2018Publication date: February 13, 2020Inventors: Amer A. Hassan, Edward C. Giaimo, III
-
Publication number: 20200053076Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums for securing biometric data using an encryption technique that does not require key storage or distribution. In some examples, a first biometric template of a user is input into a function that selects or determines parameters (such as an encryption key) of an encryption function that is then used to encrypt a second biometric template of the user.Type: ApplicationFiled: August 7, 2018Publication date: February 13, 2020Inventors: Amer A. Hassan, Edward C. Giaimo, III
-
Patent number: 10447338Abstract: A spreading sequence generator for a first radio frequency (RF) transceiver receives an RF signal from a second RF transceiver. The first RF transceiver measures power levels of the received RF signal at a plurality of instants to generate respective digital power level values and uses the plurality of digital power level values to create a first spreading sequence. The second RF transceiver receives an RF signal from the first RF transceiver and performs the same functions to create a second spreading sequence. Due to the reciprocal nature of the RF channel between the first and second RF transceivers, the first and second cryptographic keys match.Type: GrantFiled: June 19, 2018Date of Patent: October 15, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Amer A. Hassan, Edward C. Giaimo, III, Paul Mitchell
-
Publication number: 20180309476Abstract: A spreading sequence generator for a first radio frequency (RF) transceiver receives an RF signal from a second RF transceiver. The first RF transceiver measures power levels of the received RF signal at a plurality of instants to generate respective digital power level values and uses the plurality of digital power level values to create a first spreading sequence. The second RF transceiver receives an RF signal from the first RF transceiver and performs the same functions to create a second spreading sequence. Due to the reciprocal nature of the RF channel between the first and second RF transceivers, the first and second cryptographic keys match.Type: ApplicationFiled: June 19, 2018Publication date: October 25, 2018Inventors: Amer A. Hassan, Edward C. Giaimo, III, Paul Mitchell
-
Patent number: 10063156Abstract: A leakage reduction circuit is described herein that is configured to reduce high voltage leakage that may occur in electrical power step-down scenarios. The leakage reduction circuit, for instance, may be employed in a power adapter for a client device, such as a mobile computing device. For example, a power adapter may include a high voltage alternating current (AC) input, and circuitry for converting the AC input into lower voltage direct current (DC) for output to a client device. Implementations of the disclosed leakage reduction circuit include an arrangement of capacitors that provides a noise return path (e.g., for common mode noise) in a power adapter, while reducing high voltage leakage that may occur from a high voltage AC input to a lower voltage DC output of the power adapter.Type: GrantFiled: March 27, 2014Date of Patent: August 28, 2018Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Chee Kiong Fong, David Richard Perchilk, Suet Fong Tin, Michael Donovan Rulien, Perry Samuel Stultz, Edward C. Giaimo, III