Patents by Inventor James M. Behmke

James M. Behmke has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200226592
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: December 4, 2019
    Publication date: July 16, 2020
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20200184084
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: December 4, 2019
    Publication date: June 11, 2020
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20200186506
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: December 4, 2019
    Publication date: June 11, 2020
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20200186344
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: December 4, 2019
    Publication date: June 11, 2020
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20200186363
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: December 4, 2019
    Publication date: June 11, 2020
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20190095775
    Abstract: Systems and methods herein are directed to an artificial intelligence (AI) character capable of natural verbal and visual interactions with a human. In one embodiment, an AI character system receives, in real-time, one or both of an audio user input and a visual user input of a user interacting with the AI character system. The AI character systems determines one or more avatar characteristics based on the one or both of the audio user input and the visual user input of the user. The AI character system manages interaction of an avatar with the user based on the one or more avatar characteristics.
    Type: Application
    Filed: September 25, 2018
    Publication date: March 28, 2019
    Inventors: Roman Lembersky, Michael James Borke, Hayk Bezirganyan, Ashley Crowder, Benjamin Conway, Hoang Son Vu, James M. Behmke
  • Patent number: 9679542
    Abstract: According to embodiments herein, a circular, semi-circular, or generally rounded piano keyboard is shown and described. In particular, in an illustrative embodiment, the piano keyboard is a fully to nearly-fully circular stage piano keyboard that surrounds a keyboardist, allowing for up to 360 degrees of key-play. Other, e.g., wearable, embodiments of the circular piano keyboard are also described, such as a curved keytar or a curvaceous “keydress.
    Type: Grant
    Filed: December 30, 2014
    Date of Patent: June 13, 2017
    Assignee: PianoArc, LLC
    Inventors: Brockett Parsons, Charles E. Johnson, Kareem Devlin Byrne, Richard Fell, James M. Behmke
  • Publication number: 20160266543
    Abstract: Systems and methods herein are directed to three-dimensional image sources for an enhanced Pepper's Ghost Illusion. In one embodiment, a contoured bounce is described, allowing for contorting a bounce to different shapes, giving it enhanced three-dimensional (3D) effect. For instance, the bounce may include certain topography (raised portions), or else may actually comprise various 3D shapes (e.g., cubes, semi-spheres, etc.). In another embodiment, a multi-level image source is described, allowing for multiple image sources (e.g., projected bounces and/or panel displays) to be used and placed at different heights with respect to a transparent viewing screen, thus projecting images that appear at various depths, increasing the three-dimensional (3D) effect of the Pepper's Ghost Illusion. In addition, in one embodiment, the heights of the image sources may be adjusted (e.g., dynamically), making corresponding holographic images change their depth perspective to an audience, further enhancing the 3D effect.
    Type: Application
    Filed: March 9, 2016
    Publication date: September 15, 2016
    Inventors: Ashley Crowder, Benjamin Conway, Troy P. Senkiewicz, James M. Behmke
  • Publication number: 20160267577
    Abstract: Systems and methods herein are directed to a holographic interactive retail system. In particular, various embodiments are described where a holographic image (e.g., Pepper's Ghost Illusion) is used in a retail setting (e.g., storefront window), which, when combined with gesture control, allows people to walk up to the system and search for and buy products. For example, the customers can interact with a holographic sales clerk, and can select holographic products via gesture control. A final purchase can be made through the customer's mobile device or through a self-service kiosk, shipping the product to their house.
    Type: Application
    Filed: March 11, 2016
    Publication date: September 15, 2016
    Inventors: Ashley Crowder, Benjamin Conway, James M. Behmke
  • Publication number: 20150107445
    Abstract: According to embodiments herein, a circular, semi-circular, or generally rounded piano keyboard is shown and described. In particular, in an illustrative embodiment, the piano keyboard is a fully to nearly-fully circular stage piano keyboard that surrounds a keyboardist, allowing for up to 360 degrees of key-play. Other, e.g., wearable, embodiments of the circular piano keyboard are also described, such as a curved keytar or a curvaceous “keydress.
    Type: Application
    Filed: December 30, 2014
    Publication date: April 23, 2015
    Inventors: Brockett Parsons, Charles E. Johnson, Kareem Devlin Byrne, Richard Fell, James M. Behmke
  • Patent number: 8952232
    Abstract: According to embodiments herein, a circular, semi-circular, or generally rounded piano keyboard is shown and described. In particular, in an illustrative embodiment, the piano keyboard is a fully to nearly-fully circular stage piano keyboard that surrounds a keyboardist, allowing for up to 360 degrees of key-play. Other, e.g., wearable, embodiments of the circular piano keyboard are also described, such as a curved keytar or a curvaceous “keydress.
    Type: Grant
    Filed: January 14, 2013
    Date of Patent: February 10, 2015
    Assignee: PianoArc, LLC
    Inventors: Brockett Parsons, Charles E. Johnson, Kareem Devlin Byrne, Richard Fell, James M. Behmke
  • Publication number: 20130192444
    Abstract: According to embodiments herein, a circular, semi-circular, or generally rounded piano keyboard is shown and described. In particular, in an illustrative embodiment, the piano keyboard is a fully to nearly-fully circular stage piano keyboard that surrounds a keyboardist, allowing for up to 360 degrees of key-play. Other, e.g., wearable, embodiments of the circular piano keyboard are also described, such as a curved keytar or a curvaceous “keydress.
    Type: Application
    Filed: January 14, 2013
    Publication date: August 1, 2013
    Inventors: Brockett Parsons, Charles E. Johnson, Kareem Devlin Byrne, Richard Fell, James M. Behmke