Patents by Inventor Greg DEICKMAN

Greg DEICKMAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11870907
    Abstract: When a user attempts to execute a procedure for transfer or the like from an app, user authentication is first required by a PIN code or the like. When the user authentication is successful, function limitation of an IC chip is released and a mode in which a function provided by the IC chip can be used is set. The app encrypts a procedure message describing procedure content with a private key using the function of the IC chip and creates an electronic signature. When the electronic signature and the procedure message are sent to an online service server, the server verifies the electronic signature using the corresponding electronic certificate. When the procedure message is sent from a valid user and it is confirmed as a result of the verification that the content is not altered, the server executes the procedure for transfer or the like in accordance with the content of the procedure message.
    Type: Grant
    Filed: June 26, 2019
    Date of Patent: January 9, 2024
    Assignee: JAPAN COMMUNICATIONS INC.
    Inventors: Naohisa Fukuda, Greg Deickman, Hiroaki Yokoyama, Yasushi Shibuya, Masataka Hayashi
  • Patent number: 11863681
    Abstract: When a user activates an app, user authentication by a PIN code or the like is first executed. When the user authentication is successful (that is, when it is confirmed that a party operating the app is a user), function limitation of the IC chip is released and a mode in which a function provided by the IC chip can be used is set. The app creates an electronic signature with a private key using the function of the IC chip. When the electronic signature and the user ID are sent to a server of an online service, the server verifies the electronic signature using the corresponding electronic certificate. When the user ID is confirmed to be a user ID sent from a valid user, the user is permitted to use the online service.
    Type: Grant
    Filed: June 26, 2019
    Date of Patent: January 2, 2024
    Assignee: JAPAN COMMUNICATIONS INC.
    Inventors: Naohisa Fukuda, Greg Deickman, Hiroaki Yokoyama, Yasushi Shibuya, Masataka Hayashi
  • Patent number: 11617084
    Abstract: When a user attempts to execute a procedure for transfer or the like from an app, user authentication is first required by a PIN code or the like. When the user authentication is successful, function limitation of an IC chip is released and a mode in which a function provided by the IC chip can be used is set. The app encrypts a procedure message describing procedure content with a private key using the function of the IC chip and creates electronic signature. The electronic signature and the procedure message are transmitted to a server of an online service via an intermediate server. The server executes a procedure of transfer or the like in accordance with the content of the procedure message.
    Type: Grant
    Filed: June 26, 2019
    Date of Patent: March 28, 2023
    Assignee: JAPAN COMMUNICATIONS INC.
    Inventors: Naohisa Fukuda, Greg Deickman, Hiroaki Yokoyama, Yasushi Shibuya, Masataka Hayashi
  • Publication number: 20210297862
    Abstract: When a user attempts to execute a procedure for transfer or the like from an app, user authentication is first required by a PIN code or the like. When the user authentication is successful, function limitation of an IC chip is released and a mode in which a function provided by the IC chip can be used is set. The app encrypts a procedure message describing procedure content with a private key using the function of the IC chip and creates electronic signature. The electronic signature and the procedure message are transmitted to a server of an online service via an intermediate server. The server executes a procedure of transfer or the like in accordance with the content of the procedure message.
    Type: Application
    Filed: June 26, 2019
    Publication date: September 23, 2021
    Inventors: Naohisa Fukuda, Greg Deickman, Hiroaki Yokoyama, Yasushi Shibuya, Masataka Hayashi
  • Publication number: 20210281415
    Abstract: When a user activates an app, user authentication by a PIN code or the like is first executed. When the user authentication is successful (that is, when it is confirmed that a party operating the app is a user), function limitation of the IC chip is released and a mode in which a function provided by the IC chip can be used is set. The app creates an electronic signature with a private key using the function of the IC chip. When the electronic signature and the user ID are sent to a server of an online service, the server verifies the electronic signature using the corresponding electronic certificate. When the user ID is confirmed to be a user ID sent from a valid user, the user is permitted to use the online service.
    Type: Application
    Filed: June 26, 2019
    Publication date: September 9, 2021
    Inventors: Naohisa Fukuda, Greg Deickman, Hiroaki Yokoyama, Yasushi Shibuya, Masataka Hayashi
  • Publication number: 20210281416
    Abstract: When a user attempts to execute a procedure for transfer or the like from an app, user authentication is first required by a PIN code or the like. When the user authentication is successful, function limitation of an IC chip is released and a mode in which a function provided by the IC chip can be used is set. The app encrypts a procedure message describing procedure content with a private key using the function of the IC chip and creates an electronic signature. When the electronic signature and the procedure message are sent to an online service server, the server verifies the electronic signature using the corresponding electronic certificate. When the procedure message is sent from a valid user and it is confirmed as a result of the verification that the content is not altered, the server executes the procedure for transfer or the like in accordance with the content of the procedure message.
    Type: Application
    Filed: June 26, 2019
    Publication date: September 9, 2021
    Inventors: Naohisa Fukuda, Greg Deickman, Hiroaki Yokoyama, Yasushi Shibuya, Masataka Hayashi
  • Publication number: 20170264592
    Abstract: Methods and systems for controlling secure network communication are provided. A request is received from a terminal device to establish a session with a remote application server for a secure network communication. At least one routing table is selected. The at least one routing table is selected is specific to a communication session requested to route data traffic to establish a secure data communication path. At least one proxy connection server that provides functionality of managing the session is selected. A first secure connection that is between the terminal device and the connection server is activated based on the selected routing table. Additionally, a second secure connection between the connection server and the remote application server is activated based on the selected routing table. Further, data traffic for the session is routed using the activated routing table through the activated proxy connection server.
    Type: Application
    Filed: March 8, 2017
    Publication date: September 14, 2017
    Inventors: Nobuhisa YODA, Frank SANDA, Naohisa FUKUDA, Kazutaka NIHONGI, Greg DEICKMAN
  • Publication number: 20170201627
    Abstract: Methods and systems provide a telephone service with a personal switch box. One aspect of an embodiment of the invention extends use of a telephone number on a Public Switched Telephone Network to mobile terminals by a personal switch box relaying telephone call signals between the Public Telephone Network and an IP-PBX, where the IP-PBX routes the calls between the personal switch box and a cellular phone that is associated with the personal switch box, through a gateway of a mobile virtual network operator the telephone number over mobile wireless network. The gateway may control network bandwidth allocation for the data traffic with the mobile terminals during voice stream data transmission for providing required quality of service.
    Type: Application
    Filed: November 2, 2016
    Publication date: July 13, 2017
    Inventors: Naohisa Fukuda, Frank Seiji Sanda, Yasushi Kudo, Greg Deickman, Kotaro Takahashi, Hiroaki Yokoyama, Takaaki Kawataka, Daisuke Tajima, Takahiro Sato, Kazuhiro Shirato
  • Publication number: 20160381693
    Abstract: Methods and systems for dynamically controlling per-session throughput and application priority are provided. Said method is under the control of one or more computer systems configured with executable instructions. The method comprises receiving, at a mobile virtual network operator, a request to initiate a data-based application. The request is received from a mobile device that is associated with a data plan that is managed by the mobile virtual network operator. The data-based application is associated with a category of data. The method also comprises evaluating the request at a feedback-based packet control system of the mobile virtual network operator utilizing a speed monitoring module and business rule engine in evaluating the request. The method further comprises allocating data to the data-based application request. The allocation of data is based on a data plan and and/or category of data. Additionally, the method comprises providing the data-based application request to a server.
    Type: Application
    Filed: May 11, 2016
    Publication date: December 29, 2016
    Inventors: FRANK SEIJI SANDA, NAOHISA FUKUDA, YASUSHI KUDO, MASAKAZU KANAYAMA, GREG DEICKMAN, JASON PROUTY, JUSTICE OBREY, HIROKAZU TSURUGA, NADAV KALMAN ROSEN
  • Publication number: 20160352564
    Abstract: A computer-implemented method for providing data communication between two or more host systems is provided. The method comprises designating a first network as a primary network by updating a routing table, monitoring network connections on the first network channel and a second network channel, transmitting data on the first network channel according to the routing table, detecting termination of network connection on the first network channel, determining to transmit data traffic on the first network channel, modifying the routing table, transmitting data traffic on the second network channel according to the routing table, detecting connection on the first network channel, and in response to the detection of data traffic on the first network channel, measuring a network attribute and comparing against a satisfactory threshold, and selecting the first network channel for data communication if the network attribute value satisfies the threshold.
    Type: Application
    Filed: August 10, 2016
    Publication date: December 1, 2016
    Inventors: Frank S. SANDA, Yasushi KUDO, Naohisa FUKUDA, Greg DEICKMAN, Kevin FRIES, James Marcus WINN, Brian KREWSON, Nobuhisa YODA, Jonathan SOMERS