Patents by Inventor James M. Behmke

James M. Behmke has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11323424
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Grant
    Filed: December 4, 2019
    Date of Patent: May 3, 2022
    Assignee: Journey.ai
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20220006649
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: May 28, 2021
    Publication date: January 6, 2022
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20210399901
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: September 1, 2021
    Publication date: December 23, 2021
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20210385092
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: August 25, 2021
    Publication date: December 9, 2021
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20210330133
    Abstract: A bathtub platform insert is described herein (e.g., a footrest, backrest, or table). For example, a bathtub footrest insert herein allows a bather to adjust the length of the “sitting portion” of the bathtub, by securely inserting the bathtub footrest to establish a customizable distance between a backrest of the bathtub to the footrest, such that a bather of shorter height may comfortably stay above the water while soaking in a bathtub. In one embodiment, an example bathtub platform insert herein may comprise: a support surface; adjustable securing members extending outwardly widthwise from the support surface; and gripping end pieces on each end of the adjustable securing members; wherein the adjustable securing members are adjustable to extend an overall width of the bathtub platform insert between opposing pairs of gripping end pieces to secure the opposing pairs of gripping end pieces against a wall of a bathtub.
    Type: Application
    Filed: April 27, 2021
    Publication date: October 28, 2021
    Inventors: Casie Lovelace, Staci Wright, Lauren R. Skidmore, James M. Behmke, Brian J. Hickey
  • Publication number: 20210320805
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: May 28, 2021
    Publication date: October 14, 2021
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20210311161
    Abstract: The present disclosure relates generally to satellite communication systems, and, more particularly, to trilateration-based satellite location accuracy for improved satellite-based geolocation are provided.
    Type: Application
    Filed: February 26, 2021
    Publication date: October 7, 2021
    Inventors: Robert S. Reis, Shmuel Shaffer, Darren Robert Reis, James M. Behmke
  • Publication number: 20210311202
    Abstract: According to one or more of the embodiments herein, systems and techniques for multi-subset-based detection and mitigation of Global Navigation Satellite System (GNSS) spoofing are provided. In one embodiment, a method comprises: determining data associated with a distance between an object and each of a plurality of satellites to produce a corresponding plurality of datums; creating a plurality of different subsets of the datums; determining a plurality of possible computed solutions for the object based on the subsets of datums; determining, in response to the plurality of possible computed solutions falling within an acceptable proximity of each other, a trusted computed solution for the object based on the plurality of datums; and initiating, in response to at least one the plurality of possible computed solutions not falling within the acceptable proximity of each other of the plurality of possible computed solutions, one or more mitigation actions.
    Type: Application
    Filed: February 26, 2021
    Publication date: October 7, 2021
    Inventors: Robert S. Reis, Shmuel Shaffer, Darren Robert Reis, James M. Behmke
  • Publication number: 20210311199
    Abstract: Satellite echoing for geolocation and mitigation of Global Navigation Satellite System (GNSS) denial are provided herein, where an example method comprises: transmitting an initiated message to a communication satellite along a communication path that has a target device with an unknown distance to the communication satellite; receiving a returned message from the communication satellite over the communication path in response to the initiated message; determining a local time difference between the transmission time and the reception time; calculating a distance between the communication satellite and the target device, the distance calculated based on a portion of the determined time difference associated with only a single traversal of a portion of the communication path that is between the communication satellite and the target device; and performing one or more actions based on the distance between the communication satellite and the target device.
    Type: Application
    Filed: February 26, 2021
    Publication date: October 7, 2021
    Inventors: Robert S. Reis, Shmuel Shaffer, Darren Robert Reis, James M. Behmke
  • Publication number: 20210311198
    Abstract: According to one or more embodiments herein, interferometry-based satellite location accuracy is provided.
    Type: Application
    Filed: February 26, 2021
    Publication date: October 7, 2021
    Inventors: Robert S. Reis, Shmuel Shaffer, Darren Robert Reis, James M. Behmke
  • Publication number: 20210313678
    Abstract: In one embodiment, a method comprises: receiving a signal from a remote antenna at first and second antennas, the first and second antenna being collocated and offset from one another by a fixed predetermined angle such that a center of a high gain region of a main lobe of the first antenna is substantially aligned with a low gain region of a main lobe of the second antenna; determining a set of characteristics of the signal based on the signal being received at the first antenna; decoding a first data set based on the signal being received at the first antenna and a second data set based on the signal being received at the second antenna, both using the set of signal characteristics; and determining a currently aimed direction of the first antenna with relation to the remote antenna based on the difference between the first and second data sets.
    Type: Application
    Filed: March 30, 2021
    Publication date: October 7, 2021
    Inventors: Shmuel Shaffer, Darren Robert Reis, James M. Behmke
  • Publication number: 20210311203
    Abstract: According to one or more of the embodiments herein, systems and techniques for satellite relaying for geolocation and mitigation of Global Navigation Satellite System (GNSS) denial are provided.
    Type: Application
    Filed: February 26, 2021
    Publication date: October 7, 2021
    Inventors: Robert S. Reis, Shmuel Shaffer, Darren Robert Reis, James M. Behmke
  • Publication number: 20210311201
    Abstract: According to one or more of the embodiments herein, systems and techniques for multi-system-based detection and mitigation of Global Navigation Satellite System (GNSS) spoofing are provided. In one embodiment, a method comprises: obtaining a first location of an object from a primary location determination hardware system; obtaining a second location of the object from a secondary location determination hardware system; determining a distance difference between the first location and the second location; determining whether the distance difference between the first location and the second location is acceptable based on a threshold distance; and initiating one or more mitigation actions in response to the distance difference between the first location and the second location being unacceptable.
    Type: Application
    Filed: February 26, 2021
    Publication date: October 7, 2021
    Inventors: Robert S. Reis, Shmuel Shaffer, Darren Robert Reis, James M. Behmke
  • Patent number: 11139985
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Grant
    Filed: December 4, 2019
    Date of Patent: October 5, 2021
    Assignee: Journey.ai
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Patent number: 11133940
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Grant
    Filed: December 4, 2019
    Date of Patent: September 28, 2021
    Assignee: Journey.ai
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20210269204
    Abstract: Embodiments herein provide for a dosage reminder indicator for containers, allowing a user to align a dosage reminder (e.g., “last” or “next”) with timing indicators (e.g., days, times). In one embodiment, an inner dial has first engaging members and an outer ring has second engaging members mating with the first engaging members, where a dosage reminder indicator and a plurality of dosage timing indicators are opposingly located on either the inner dial or outer ring. The inner dial and the outer ring are rotatably engaged with respect to each other such that the dosage reminder indicator points to any selected one of the plurality of dosage timing indicators in a secured position (when the first and second engaging members are mated), where rotation is permitted based on user-applied force to disengage mating of the first and second engaging members, while the inner dial and the outer ring remain rotatably engaged.
    Type: Application
    Filed: March 2, 2021
    Publication date: September 2, 2021
    Inventors: Catherine Mary LaBrecque, James M. Behmke, Brian J. Hickey
  • Publication number: 20200396221
    Abstract: The techniques herein are directed generally to providing access control and persona validation for interactions. In one embodiment, a method for a first device comprises: interacting with a second device on a communication channel; determining, over a verification channel with a verification service, that an identity of a user communicating on the second device is a verified identity according to the verification service; determining a persona of the user; querying a third-party entity to make a determination whether the persona is validated and to correspondingly determine a current privilege level; and managing interaction with the second device according to the determination whether the persona is validated and the corresponding current privilege level. Another embodiment comprises a verification server's perspective of facilitating the interaction between the first and second devices, where the verification server queries the third-party entity to validate the persona.
    Type: Application
    Filed: August 28, 2020
    Publication date: December 17, 2020
    Inventors: Shmuel Shaffer, Yolanda Schwartz, Alexander John Shockley, Moni Manor, James M. Behmke
  • Publication number: 20200228333
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: December 4, 2019
    Publication date: July 16, 2020
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20200228506
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: December 4, 2019
    Publication date: July 16, 2020
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20200226592
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: December 4, 2019
    Publication date: July 16, 2020
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke