Patents by Inventor James M. Behmke
James M. Behmke has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11323424Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.Type: GrantFiled: December 4, 2019Date of Patent: May 3, 2022Assignee: Journey.aiInventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
-
Publication number: 20220006649Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.Type: ApplicationFiled: May 28, 2021Publication date: January 6, 2022Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
-
Publication number: 20210399901Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.Type: ApplicationFiled: September 1, 2021Publication date: December 23, 2021Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
-
Publication number: 20210385092Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.Type: ApplicationFiled: August 25, 2021Publication date: December 9, 2021Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
-
Publication number: 20210330133Abstract: A bathtub platform insert is described herein (e.g., a footrest, backrest, or table). For example, a bathtub footrest insert herein allows a bather to adjust the length of the “sitting portion” of the bathtub, by securely inserting the bathtub footrest to establish a customizable distance between a backrest of the bathtub to the footrest, such that a bather of shorter height may comfortably stay above the water while soaking in a bathtub. In one embodiment, an example bathtub platform insert herein may comprise: a support surface; adjustable securing members extending outwardly widthwise from the support surface; and gripping end pieces on each end of the adjustable securing members; wherein the adjustable securing members are adjustable to extend an overall width of the bathtub platform insert between opposing pairs of gripping end pieces to secure the opposing pairs of gripping end pieces against a wall of a bathtub.Type: ApplicationFiled: April 27, 2021Publication date: October 28, 2021Inventors: Casie Lovelace, Staci Wright, Lauren R. Skidmore, James M. Behmke, Brian J. Hickey
-
Publication number: 20210320805Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.Type: ApplicationFiled: May 28, 2021Publication date: October 14, 2021Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
-
Publication number: 20210311161Abstract: The present disclosure relates generally to satellite communication systems, and, more particularly, to trilateration-based satellite location accuracy for improved satellite-based geolocation are provided.Type: ApplicationFiled: February 26, 2021Publication date: October 7, 2021Inventors: Robert S. Reis, Shmuel Shaffer, Darren Robert Reis, James M. Behmke
-
Publication number: 20210311202Abstract: According to one or more of the embodiments herein, systems and techniques for multi-subset-based detection and mitigation of Global Navigation Satellite System (GNSS) spoofing are provided. In one embodiment, a method comprises: determining data associated with a distance between an object and each of a plurality of satellites to produce a corresponding plurality of datums; creating a plurality of different subsets of the datums; determining a plurality of possible computed solutions for the object based on the subsets of datums; determining, in response to the plurality of possible computed solutions falling within an acceptable proximity of each other, a trusted computed solution for the object based on the plurality of datums; and initiating, in response to at least one the plurality of possible computed solutions not falling within the acceptable proximity of each other of the plurality of possible computed solutions, one or more mitigation actions.Type: ApplicationFiled: February 26, 2021Publication date: October 7, 2021Inventors: Robert S. Reis, Shmuel Shaffer, Darren Robert Reis, James M. Behmke
-
Publication number: 20210311199Abstract: Satellite echoing for geolocation and mitigation of Global Navigation Satellite System (GNSS) denial are provided herein, where an example method comprises: transmitting an initiated message to a communication satellite along a communication path that has a target device with an unknown distance to the communication satellite; receiving a returned message from the communication satellite over the communication path in response to the initiated message; determining a local time difference between the transmission time and the reception time; calculating a distance between the communication satellite and the target device, the distance calculated based on a portion of the determined time difference associated with only a single traversal of a portion of the communication path that is between the communication satellite and the target device; and performing one or more actions based on the distance between the communication satellite and the target device.Type: ApplicationFiled: February 26, 2021Publication date: October 7, 2021Inventors: Robert S. Reis, Shmuel Shaffer, Darren Robert Reis, James M. Behmke
-
Publication number: 20210311198Abstract: According to one or more embodiments herein, interferometry-based satellite location accuracy is provided.Type: ApplicationFiled: February 26, 2021Publication date: October 7, 2021Inventors: Robert S. Reis, Shmuel Shaffer, Darren Robert Reis, James M. Behmke
-
Publication number: 20210313678Abstract: In one embodiment, a method comprises: receiving a signal from a remote antenna at first and second antennas, the first and second antenna being collocated and offset from one another by a fixed predetermined angle such that a center of a high gain region of a main lobe of the first antenna is substantially aligned with a low gain region of a main lobe of the second antenna; determining a set of characteristics of the signal based on the signal being received at the first antenna; decoding a first data set based on the signal being received at the first antenna and a second data set based on the signal being received at the second antenna, both using the set of signal characteristics; and determining a currently aimed direction of the first antenna with relation to the remote antenna based on the difference between the first and second data sets.Type: ApplicationFiled: March 30, 2021Publication date: October 7, 2021Inventors: Shmuel Shaffer, Darren Robert Reis, James M. Behmke
-
Publication number: 20210311203Abstract: According to one or more of the embodiments herein, systems and techniques for satellite relaying for geolocation and mitigation of Global Navigation Satellite System (GNSS) denial are provided.Type: ApplicationFiled: February 26, 2021Publication date: October 7, 2021Inventors: Robert S. Reis, Shmuel Shaffer, Darren Robert Reis, James M. Behmke
-
Publication number: 20210311201Abstract: According to one or more of the embodiments herein, systems and techniques for multi-system-based detection and mitigation of Global Navigation Satellite System (GNSS) spoofing are provided. In one embodiment, a method comprises: obtaining a first location of an object from a primary location determination hardware system; obtaining a second location of the object from a secondary location determination hardware system; determining a distance difference between the first location and the second location; determining whether the distance difference between the first location and the second location is acceptable based on a threshold distance; and initiating one or more mitigation actions in response to the distance difference between the first location and the second location being unacceptable.Type: ApplicationFiled: February 26, 2021Publication date: October 7, 2021Inventors: Robert S. Reis, Shmuel Shaffer, Darren Robert Reis, James M. Behmke
-
Patent number: 11139985Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.Type: GrantFiled: December 4, 2019Date of Patent: October 5, 2021Assignee: Journey.aiInventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
-
Patent number: 11133940Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.Type: GrantFiled: December 4, 2019Date of Patent: September 28, 2021Assignee: Journey.aiInventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
-
Publication number: 20210269204Abstract: Embodiments herein provide for a dosage reminder indicator for containers, allowing a user to align a dosage reminder (e.g., “last” or “next”) with timing indicators (e.g., days, times). In one embodiment, an inner dial has first engaging members and an outer ring has second engaging members mating with the first engaging members, where a dosage reminder indicator and a plurality of dosage timing indicators are opposingly located on either the inner dial or outer ring. The inner dial and the outer ring are rotatably engaged with respect to each other such that the dosage reminder indicator points to any selected one of the plurality of dosage timing indicators in a secured position (when the first and second engaging members are mated), where rotation is permitted based on user-applied force to disengage mating of the first and second engaging members, while the inner dial and the outer ring remain rotatably engaged.Type: ApplicationFiled: March 2, 2021Publication date: September 2, 2021Inventors: Catherine Mary LaBrecque, James M. Behmke, Brian J. Hickey
-
Publication number: 20200396221Abstract: The techniques herein are directed generally to providing access control and persona validation for interactions. In one embodiment, a method for a first device comprises: interacting with a second device on a communication channel; determining, over a verification channel with a verification service, that an identity of a user communicating on the second device is a verified identity according to the verification service; determining a persona of the user; querying a third-party entity to make a determination whether the persona is validated and to correspondingly determine a current privilege level; and managing interaction with the second device according to the determination whether the persona is validated and the corresponding current privilege level. Another embodiment comprises a verification server's perspective of facilitating the interaction between the first and second devices, where the verification server queries the third-party entity to validate the persona.Type: ApplicationFiled: August 28, 2020Publication date: December 17, 2020Inventors: Shmuel Shaffer, Yolanda Schwartz, Alexander John Shockley, Moni Manor, James M. Behmke
-
Publication number: 20200228333Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.Type: ApplicationFiled: December 4, 2019Publication date: July 16, 2020Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
-
Publication number: 20200228506Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.Type: ApplicationFiled: December 4, 2019Publication date: July 16, 2020Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
-
Publication number: 20200226592Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.Type: ApplicationFiled: December 4, 2019Publication date: July 16, 2020Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke