Patents by Inventor Francois-Eric Michel Guyomarc'h
Francois-Eric Michel Guyomarc'h has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240143796Abstract: Securely storing data includes encrypting the data using a random key to provide obfuscated data, scrambling the obfuscated data to provide scrambled obfuscated data, generating a scramble schema indicating how to unscramble the scrambled obfuscated data, encrypting the scrambled obfuscated data to provide encrypted scrambled obfuscated data, splitting the scramble schema, and distributing separate portions of the scramble schema and separate portions of the encrypted scrambled obfuscated data to separate entities. The data may be private key data. Securely storing data may also include concatenating the random key on to the obfuscated data prior to scrambling the obfuscated data, wherein the random key is scrambled together with the obfuscated data. Scrambling the obfuscated data may use a Fisher Yates Shuffle mechanism. Securely storing data may also include generating and distributing a symmetric authentication key that is used to authenticate a first entity to a second entity.Type: ApplicationFiled: December 7, 2023Publication date: May 2, 2024Inventors: François-Eric Michel Guyomarc'h, Francois Menard
-
Patent number: 11874935Abstract: Securely storing data includes encrypting the data using a random key to provide obfuscated data, scrambling the obfuscated data to provide scrambled obfuscated data, generating a scramble schema indicating how to unscramble the scrambled obfuscated data, encrypting the scrambled obfuscated data to provide encrypted scrambled obfuscated data, splitting the scramble schema, and distributing separate portions of the scramble schema and separate portions of the encrypted scrambled obfuscated data to separate entities. The data may be private key data. Securely storing data may also include concatenating the random key on to the obfuscated data prior to scrambling the obfuscated data, wherein the random key is scrambled together with the obfuscated data. Scrambling the obfuscated data may use a Fisher Yates Shuffle mechanism. Securely storing data may also include generating and distributing a symmetric authentication key that is used to authenticate a first entity to a second entity.Type: GrantFiled: October 7, 2020Date of Patent: January 16, 2024Assignee: ASSA ABLOY ABInventors: François-Eric Michel Guyomarc'h, Francois Menard
-
Publication number: 20230409693Abstract: Customizing an application on a mobile device includes storing at least a portion of customization data in a customization server that is independent of the mobile device, a user of the mobile device accessing the customization server independently of the mobile device, receiving authorization data from the customization server that enables the mobile device to securely receive customization data from the customization server, and the mobile device using the authorization data to cause the customization server to provide the customization data to the mobile device. The authorization data may be provided by postal message, email message, an SMS text message, and/or a visual code provided on a screen of a computer used to access the customization server. The user may use a computer to provide credential information to access the customization server. Customizing the application may allow the mobile device to access a user service on behalf of the user.Type: ApplicationFiled: August 30, 2023Publication date: December 21, 2023Inventors: François-Eric Michel Guyomarc'h, James William Holland, Milan Khan, Caleb Wattles
-
Patent number: 11775628Abstract: Customizing an application on a mobile device includes storing at least a portion of customization data in a customization server that is independent of the mobile device, a user of the mobile device accessing the customization server independently of the mobile device, receiving authorization data from the customization server that enables the mobile device to securely receive customization data from the customization server, and the mobile device using the authorization data to cause the customization server to provide the customization data to the mobile device. The authorization data may be provided by postal message, email message, an SMS text message, and/or a visual code provided on a screen of a computer used to access the customization server. The user may use a computer to provide credential information to access the customization server. Customizing the application may allow the mobile device to access a user service on behalf of the user.Type: GrantFiled: October 4, 2017Date of Patent: October 3, 2023Assignee: ASSA ABLOY ABInventors: Francois-Eric Michel Guyomarc'h, James William Holland, Milan Khan, Caleb Wattles
-
Patent number: 11736468Abstract: Confirming user consent includes prompting the user to tap a card a card reader or a computing device and confirming consent in response to the user taping the card. The user may be prompted for a response in a plurality of possible responses and only a particular one of the possible responses may require taping the card. The user may consent to installation of software on the computing device. The user may be logged in to the computing device. A login ID for the user may be cached and/or may be accessed in connection with the user tapping the card. Confirming user consent may also include obtaining a pairing code for accessing the card and confirming consent in response to the user taping the card and the pairing code allowing access to the card. The pairing code may be cached in the card reader or the computing device.Type: GrantFiled: March 11, 2016Date of Patent: August 22, 2023Assignee: ASSA ABLOY ABInventors: Ian Lowe, Francois-Eric Michel Guyomarc'h, James William Holland
-
Publication number: 20220150239Abstract: A method of device authentication comprises receiving a password into an application of a user device; transmitting verification information of the password from the application to an authentication device; verifying, by the authentication device, validity of the password using the verification information; granting, by the authentication device, access by the user device to a secure resource when the password is valid; sending no indication of an invalid password to the user device when the authentication device determines the password is invalid; and blocking access of the user device to the secure resource when a predetermined number of passwords are determined to be invalid by the authentication device.Type: ApplicationFiled: November 9, 2021Publication date: May 12, 2022Inventors: Marc Raymond Powell, Francois-Eric Michel Guyomarc'h, Francois Menard
-
Patent number: 11139986Abstract: Methods, devices, and systems are provided for approving a transaction through an exchange of presented user contextual approval information and approval decryption. The user contextual approval information is generated by a user during a transaction, cryptographically signed, and provided to a transaction server. The user contextual data uniquely describes the transaction to the user and can be employed to aid a user in approving or validating the transaction in a subsequent approval action. In particular, a transaction may present the contextual approval information to a user in the form of an approval challenge message. The approval challenge message may be sent to a known user device via the transaction server in the form of a text or multi-media message. The user may respond to the message with an approval or denial response.Type: GrantFiled: February 7, 2020Date of Patent: October 5, 2021Assignee: ASSA ABLOY ABInventors: Milan Khan, François-Eric Michel Guyomarc'h, James William Holland
-
Publication number: 20210097187Abstract: Securely storing data includes encrypting the data using a random key to provide obfuscated data, scrambling the obfuscated data to provide scrambled obfuscated data, generating a scramble schema indicating how to unscramble the scrambled obfuscated data, encrypting the scrambled obfuscated data to provide encrypted scrambled obfuscated data, splitting the scramble schema, and distributing separate portions of the scramble schema and separate portions of the encrypted scrambled obfuscated data to separate entities. The data may be private key data. Securely storing data may also include concatenating the random key on to the obfuscated data prior to scrambling the obfuscated data, wherein the random key is scrambled together with the obfuscated data. Scrambling the obfuscated data may use a Fisher Yates Shuffle mechanism. Securely storing data may also include generating and distributing a symmetric authentication key that is used to authenticate a first entity to a second entity.Type: ApplicationFiled: October 7, 2020Publication date: April 1, 2021Inventors: François-Eric Michel Guyomarc'h, Francois Menard
-
Patent number: 10951611Abstract: A GUI to configure user access to a secure device. For signals received by a secure device from a user device, the GUI enables a user to intuitively configure a range of signal strength of such signals required to allow user devices access to the secure device or an application residing thereon. The GUI may present a distance range icon that visually presents a range of signal strength as a distance, each point along the length corresponding to a signal strength value. The GUI may include a control for controlling the distance range icon, and may present a user device icon for a user device currently within the signal reception range of the secure device. The user device icon may be presented in spatial relation to the distance range icon, thereby visually informing a user of the relative distance of the user device from the secure device.Type: GrantFiled: August 13, 2018Date of Patent: March 16, 2021Assignee: ASSA ABLOY ABInventors: François-Eric Michel Guyomarc'h, Christophe Cauquelin, Pol-Herve Tandeo
-
Patent number: 10824737Abstract: Securely storing data includes encrypting the data using a random key to provide obfuscated data, scrambling the obfuscated data to provide scrambled obfuscated data, generating a scramble schema indicating how to unscramble the scrambled obfuscated data, encrypting the scrambled obfuscated data to provide encrypted scrambled obfuscated data, splitting the scramble schema, and distributing separate portions of the scramble schema and separate portions of the encrypted scrambled obfuscated data to separate entities. The data may be private key data. Securely storing data may also include concatenating the random key on to the obfuscated data prior to scrambling the obfuscated data, wherein the random key is scrambled together with the obfuscated data. Scrambling the obfuscated data may use a Fisher Yates Shuffle mechanism. Securely storing data may also include generating and distributing a symmetric authentication key that is used to authenticate a first entity to a second entity.Type: GrantFiled: February 21, 2018Date of Patent: November 3, 2020Assignee: ASSA ABLOY ABInventors: François-Eric Michel Guyomarc'h, Francois Menard
-
Publication number: 20200177396Abstract: Methods, devices, and systems are provided for approving a transaction through an exchange of presented user contextual approval information and approval decryption. The user contextual approval information is generated by a user during a transaction, cryptographically signed, and provided to a transaction server. The user contextual data uniquely describes the transaction to the user and can be employed to aid a user in approving or validating the transaction in a subsequent approval action. In particular, a transaction may present the contextual approval information to a user in the form of an approval challenge message. The approval challenge message may be sent to a known user device via the transaction server in the form of a text or multi-media message. The user may respond to the message with an approval or denial response.Type: ApplicationFiled: February 7, 2020Publication date: June 4, 2020Inventors: Milan Khan, François-Eric Michel Guyomarc'h, James William Holland
-
Patent number: 10560273Abstract: Methods, devices, and systems are provided for approving a transaction through an exchange of presented user contextual approval information and approval decryption. The user contextual approval information is generated by a user during a transaction, cryptographically signed, and provided to a transaction server. The user contextual data uniquely describes the transaction to the user and can be employed to aid a user in approving or validating the transaction in a subsequent approval action. In particular, a transaction may present the contextual approval information to a user in the form of an approval challenge message. The approval challenge message may be sent to a known user device via the transaction server in the form of a text or multi-media message. The user may respond to the message with an approval or denial response.Type: GrantFiled: October 14, 2016Date of Patent: February 11, 2020Assignee: ASSA ABLOY ABInventors: Milan Khan, François-Eric Michel Guyomarc'h, James William Holland
-
Publication number: 20190228143Abstract: Customizing an application on a mobile device includes storing at least a portion of customization data in a customization server that is independent of the mobile device, a user of the mobile device accessing the customization server independently of the mobile device, receiving authorization data from the customization server that enables the mobile device to securely receive customization data from the customization server, and the mobile device using the authorization data to cause the customization server to provide the customization data to the mobile device. The authorization data may be provided by postal message, email message, an SMS text message, and/or a visual code provided on a screen of a computer used to access the customization server. The user may use a computer to provide credential information to access the customization server. Customizing the application may allow the mobile device to access a user service on behalf of the user.Type: ApplicationFiled: October 4, 2017Publication date: July 25, 2019Inventors: Francois-Eric Michel Guyomarc'h, James William Holland, Milan Khan, Caleb Wattles
-
Publication number: 20180109386Abstract: Methods, devices, and systems are provided for approving a transaction through an exchange of presented user contextual approval information and approval decryption. The user contextual approval information is generated by a user during a transaction, cryptographically signed, and provided to a transaction server. The user contextual data uniquely describes the transaction to the user and can be employed to aid a user in approving or validating the transaction in a subsequent approval action. In particular, a transaction may present the contextual approval information to a user in the form of an approval challenge message. The approval challenge message may be sent to a known user device via the transaction server in the form of a text or multi-media message. The user may respond to the message with an approval or denial response.Type: ApplicationFiled: October 14, 2016Publication date: April 19, 2018Inventors: Milan Khan, François-Eric Michel Guyomarc'h, James William Holland
-
Patent number: 9722999Abstract: A system and method are provided to access a secure host device using a personal security device (PSD). A user's PSD may hold a credential of a requesting component of the secure host device. The credential may only be readable from the PSD when a secure channel is established therewith. The establishment of a secure channel with the PSD may require access to keys. The secure host device may contain a SAM capable of securely storing and operating keys. The SMA may contain the relevant keys to support establishment of a secure channel with the personal security device and release a credential to its requesting component. These criteria may achieve the secure release of the credential from the PSD to the requesting component of the secure host device to achieve access by the user when the PSD is presented in the non-contract field of a card reader monitored by the secure host device.Type: GrantFiled: February 24, 2014Date of Patent: August 1, 2017Assignee: Assa Abloy ABInventors: John Babbidge, François-Eric Michel Guyomarc'h
-
Publication number: 20160277388Abstract: Confirming user consent includes prompting the user to tap a card a card reader or a computing device and confirming consent in response to the user taping the card. The user may be prompted for a response in a plurality of possible responses and only a particular one of the possible responses may require taping the card. The user may consent to installation of software on the computing device. The user may be logged in to the computing device. A login ID for the user may be cached and/or may be accessed in connection with the user tapping the card. Confirming user consent may also include obtaining a pairing code for accessing the card and confirming consent in response to the user taping the card and the pairing code allowing access to the card. The pairing code may be cached in the card reader or the computing device.Type: ApplicationFiled: March 11, 2016Publication date: September 22, 2016Inventors: Ian Lowe, Francois-Eric Michel Guyomarc'h, James William Holland
-
Publication number: 20160277383Abstract: Providing access to a protected resource includes obtaining a first authentication factor for a user that is accessing the resource using a computing device, prompting the user to provide a second authentication factor, accessing the second authentication factor using a pairing code, determining if the second authentication factor is bound to the computing device, and allowing the user to access the protected resource in response to the first and second authentication factors being valid and the second authentication factor being bound to the computing device. The user may be prompted to tap a card to provide the second authentication factor. The first authentication factor may be a login id and password combination. The login id and password may be cached in the computing device. The second authentication factor may be a security card. Information on the security card may be encrypted and may be accessible using a pairing code.Type: ApplicationFiled: January 22, 2016Publication date: September 22, 2016Inventors: Francois-Eric Michel Guyomarc'h, James William Holland