Patents by Inventor Kevin Weil
Kevin Weil has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11303623Abstract: A system and method including: receiving an authorization request originating from an authorization module of an application executing on a client device, where the authorization request includes an identifier identifying the client device; causing transmission, based on the identifier, of a verification message to the client device, where the verification message includes a verification code; receiving a confirmation of the verification code from the authorization module of the application executing on the client device; authenticating the application based on the receiving the confirmation of the verification code; determining that the client device identified by the identifier corresponds to a user account including secure user data associated with a user; and transmitting a unique token verifying that the application is authorized to sign into the user account, where: the unique token uniquely identifies the user account to the application, and the secure user data is not shared with the application.Type: GrantFiled: March 2, 2020Date of Patent: April 12, 2022Assignee: Twitter, Inc.Inventors: Michael Ducker, Sean Cook, Jeffrey Seibert, Jr., Alex Roetter, Kevin Weil, Akash Garg, Jeremy Gordon
-
Publication number: 20200304483Abstract: A system and method including: receiving an authorization request originating from an authorization module of an application executing on a client device, where the authorization request includes an identifier identifying the client device; causing transmission, based on the identifier, of a verification message to the client device, where the verification message includes a verification code; receiving a confirmation of the verification code from the authorization module of the application executing on the client device; authenticating the application based on the receiving the confirmation of the verification code; determining that the client device identified by the identifier corresponds to a user account including secure user data associated with a user; and transmitting a unique token verifying that the application is authorized to sign into the user account, where: the unique token uniquely identifies the user account to the application, and the secure user data is not shared with the application.Type: ApplicationFiled: March 2, 2020Publication date: September 24, 2020Inventors: Michael Ducker, Sean Cook, Jeffrey Seibert, JR., Alex Roetter, Kevin Weil, Akash Garg, Jeremy Gordon
-
Patent number: 10581824Abstract: A system and method including: receiving, from a client device, an authorization request originating from an authorization module of an application executing on the client device, where the authorization request includes an identifier identifying the client device; causing transmission, based on the identifier, of a verification message to the client device, where the verification message includes a verification code; receiving a confirmation of the verification code from the authorization module of the application executing on the client device; authenticating the application based on the receiving the confirmation of the verification code; determining that the client device identified by the identifier corresponds to a user account including secure user data associated with a user; and transmitting a unique token verifying that the application is authorized to sign into the user account, where: the unique token uniquely identifies the user account to the application, and the secure user data is not shared wType: GrantFiled: June 30, 2017Date of Patent: March 3, 2020Assignee: Twitter, Inc.Inventors: Michael Ducker, Sean Cook, Jeffrey Seibert, Jr., Alex Roetter, Kevin Weil, Akash Garg, Jeremy Gordon
-
Patent number: 10296403Abstract: A computing system including a first and a second application. The first application includes a first local software development kit (SDK) platform instance, and the first local SDK platform instance includes a first non-core SDK module instance, an application discovery module, and an inter-application communication module. The second application includes a second local SDK platform instance. The first non-core SDK module instance is configured to is a request to the application discovery module. Upon receipt of the request, the discovery module is configured to determine that the second local SDK platform instance includes a second non-core SDK module instance that is configured to service the request. The first local SDK platform instance, based on the determination, is configured to generate a deep link associated with the second application based on data collected by the first local SDK platform instance and provide the deep link to the first non-core SDK module.Type: GrantFiled: May 11, 2017Date of Patent: May 21, 2019Assignee: Google LLCInventors: Sean Cook, Jeffrey H. Seibert, Jr., Alex Roetter, Kevin Weil, Akash Garg, Jeremy Gordon, Christian Oestlien
-
Patent number: 10042684Abstract: A computing system including a first and a second application. The first application includes a first local software development kit (SDK) platform instance, and the first local SDK platform instance includes a first non-core SDK module instance, an application discovery module, and an inter-application communication module. The second application includes a second local SDK platform instance. The first non-core SDK module instance is configured to is a request to the application discovery module. Upon receipt of the request, the discovery module is configured to determine that the second local SDK platform instance includes a second non-core SDK module instance that is configured to service the request. The first local SDK platform instance, based on the determination, is configured to generate a deep link associated with the second application based on data collected by the first local SDK platform instance and provide the deep link to the first non-core SDK module.Type: GrantFiled: April 29, 2015Date of Patent: August 7, 2018Assignee: Google LLCInventors: Sean Cook, Jeffrey H. Seibert, Jr., Alex Roetter, Kevin Weil, Akash Garg, Jeremy Gordon, Christian Oestlien
-
Publication number: 20170302645Abstract: A system and method including: receiving, from a client device, an authorization request originating from an authorization module of an application executing on the client device, where the authorization request includes an identifier identifying the client device; causing transmission, based on the identifier, of a verification message to the client device, where the verification message includes a verification code; receiving a confirmation of the verification code from the authorization module of the application executing on the client device; authenticating the application based on the receiving the confirmation of the verification code; determining that the client device identified by the identifier corresponds to a user account including secure user data associated with a user; and transmitting a unique token verifying that the application is authorized to sign into the user account, where: the unique token uniquely identifies the user account to the application, and the secure user data is not shared wType: ApplicationFiled: June 30, 2017Publication date: October 19, 2017Inventors: Michael Ducker, Sean Cook, Jeffrey Seibert, JR., Alex Roetter, Kevin Weil, Akash Garg, Jeremy Gordon
-
Publication number: 20170249198Abstract: A computing system including a first and a second application. The first application includes a first local software development kit (SDK) platform instance, and the first local SDK platform instance includes a first non-core SDK module instance, an application discovery module, and an inter-application communication module. The second application includes a second local SDK platform instance. The first non-core SDK module instance is configured to is a request to the application discovery module. Upon receipt of the request, the discovery module is configured to determine that the second local SDK platform instance includes a second non-core SDK module instance that is configured to service the request. The first local SDK platform instance, based on the determination, is configured to generate a deep link associated with the second application based on data collected by the first local SDK platform instance and provide the deep link to the first non-core SDK module.Type: ApplicationFiled: May 11, 2017Publication date: August 31, 2017Inventors: Sean Cook, Jeffrey H. Seibert, JR., Alex Roetter, Kevin Weil, Akash Garg, Jeremy Gordon, Christian Oestlien
-
Patent number: 9699161Abstract: A system and method including: receiving, from a client device, an authorization request originating from an authorization module of an application executing on the client device, where the authorization request includes an identifier identifying the client device; causing transmission, based on the identifier, of a verification message to the client device, where the verification message includes a verification code; receiving a confirmation of the verification code from the authorization module of the application executing on the client device; authenticating the application based on the receiving the confirmation of the verification code; determining that the client device identified by the identifier corresponds to a user account including secure user data associated with a user; and transmitting a unique token verifying that the application is authorized to sign into the user account, where: the unique token uniquely identifies the user account to the application, and the secure user data is not shared wType: GrantFiled: April 28, 2015Date of Patent: July 4, 2017Assignee: Twitter, Inc.Inventors: Michael Ducker, Sean Cook, Jeffrey Seibert, Jr., Alex Roetter, Kevin Weil, Akash Garg, Jeremy Gordon
-
Publication number: 20170052835Abstract: A computing system including a first and a second application. The first application includes a first local software development kit (SDK) platform instance, and the first local SDK platform instance includes a first non-core SDK module instance, an application discovery module, and an inter-application communication module. The second application includes a second local SDK platform instance. The first non-core SDK module instance is configured to is a request to the application discovery module. Upon receipt of the request, the discovery module is configured to determine that the second local SDK platform instance includes a second non-core SDK module instance that is configured to service the request. The first local SDK platform instance, based on the determination, is configured to generate a deep link associated with the second application based on data collected by the first local SDK platform instance and provide the deep link to the first non-core SDK module.Type: ApplicationFiled: April 29, 2015Publication date: February 23, 2017Applicant: Twitter, Inc.Inventors: Sean Cook, Jeffrey H. Seibert, Jr., Alex Roetter, Kevin Weil, Akash Garg, Jeremy Gordon, Christian Oestlien
-
Publication number: 20150312236Abstract: A system and method including: receiving, from a client device, an authorization request originating from an authorization module of an application executing on the client device, where the authorization request includes an identifier identifying the client device; causing transmission, based on the identifier, of a verification message to the client device, where the verification message includes a verification code; receiving a confirmation of the verification code from the authorization module of the application executing on the client device; authenticating the application based on the receiving the confirmation of the verification code; determining that the client device identified by the identifier corresponds to a user account including secure user data associated with a user; and transmitting a unique token verifying that the application is authorized to sign into the user account, where: the unique token uniquely identifies the user account to the application, and the secure user data is not shared wType: ApplicationFiled: April 28, 2015Publication date: October 29, 2015Inventors: Michael Ducker, Sean Cook, Jeffrey Seiber, JR., Alex Roetter, Kevin Weil, Akash Garg, Jeremy Gordon
-
Patent number: 8750806Abstract: Methods of correlating wireless network performance of a wireless network are disclosed. One method includes collecting wireless network performance parameters at a location of the network, observing at least one of activities and conditions of the wireless network over the period of time, and correlating the wireless network performance parameters with at least one of the activities and conditions of the wireless network. The wireless network performance parameters can be collected by one or more test devices operating at nodes or clients within the wireless network.Type: GrantFiled: July 26, 2007Date of Patent: June 10, 2014Assignee: Tropos Networks, Inc.Inventors: Kevin Weil, Mukesh Gupta, Amit Saha, Cyrus Behroozi, Devabhaktuni Srikrishna
-
Patent number: 8606187Abstract: An apparatus and method of a wireless node mitigating the effects of uncoordinated interference is disclosed. One embodiment of a method includes the wireless node monitoring uncoordinated interference affecting transmissions of the wireless node, and evaluating a plurality of wireless links, the evaluation influenced at least in part on the monitored uncoordinated interference.Type: GrantFiled: August 31, 2007Date of Patent: December 10, 2013Assignee: Tropos Networks, Inc.Inventors: Kevin Weil, Peter Behroozi, Cyrus Behroozi
-
Patent number: 8559407Abstract: An apparatus and method of a wireless access node within a network characterizing uncoordinated interference is disclosed. One method includes the wireless node collecting air-time usage history as perceived by the wireless access node. The wireless access node receives air-time usage history as perceived by at least one neighboring wireless node. The wireless access node comparatively analyzes the collected air-time usage and the received air-time usage.Type: GrantFiled: August 31, 2007Date of Patent: October 15, 2013Assignee: Tropos Networks, Inc.Inventors: Kevin Weil, Peter Behroozi, Cyrus Behroozi
-
Patent number: 8533284Abstract: Multiple contact lists of a user, which individual lists are maintained in varying formats associated with varying internet-based services or computer-based applications, are federated through the use of an intermediate schema used by a federating messenger application. The federating messenger application may be instantiated as a client resident at a computer system and/or as a server-based application accessible via a Web browser or dedicated client application. In one instance, the federated messenger application includes both client-based and server-based components, and on the client-side may be resident as a browser extension or similar application.Type: GrantFiled: June 24, 2008Date of Patent: September 10, 2013Assignee: Cooliris, Inc.Inventors: Austin Shoemaker, Josh Schwarzapel, Kevin Weil, Soujanya Bhumkar
-
Patent number: 8248948Abstract: A method of determining a location of a network condition within a wireless mesh network is disclosed. The method includes a test device testing a first plurality of wireless hops of the wireless mesh network. The test device also tests a second number of wireless hops of the wireless mesh network. The test device locates the network condition within the wireless mesh network by comparing the test of the first plurality of wireless hops with the test of the second number of wireless hops.Type: GrantFiled: June 29, 2007Date of Patent: August 21, 2012Assignee: Tropos Networks, Inc.Inventors: Kevin Weil, Mukesh Gupta, Amit Saha, Cyrus Behroozi, Devabhaktuni Srikrishna
-
Publication number: 20090300139Abstract: Multiple contact lists of a user, which individual lists are maintained in varying formats associated with varying internet-based services or computer-based applications, are federated through the use of an intermediate schema used by a federating messenger application. The federating messenger application may be instantiated as a client resident at a computer system and/or as a server-based application accessible via a Web browser or dedicated client application. In one instance, the federated messenger application includes both client-based and server-based components, and on the client-side may be resident as a browser extension or similar application.Type: ApplicationFiled: June 24, 2008Publication date: December 3, 2009Inventors: Austin Shoemaker, Josh Schwarzapel, Kevin Weil, Soujanya Bhumkar
-
Publication number: 20090059851Abstract: An apparatus and method of a wireless node mitigating the effects of uncoordinated interference is disclosed. One embodiment of a method includes the wireless node monitoring uncoordinated interference affecting transmissions of the wireless node, and evaluating a plurality of wireless links, the evaluation influenced at least in part on the monitored uncoordinated interference.Type: ApplicationFiled: August 31, 2007Publication date: March 5, 2009Inventors: Kevin Weil, Peter Behroozi, Cyrus Behroozi
-
Publication number: 20090059873Abstract: An apparatus and method of a wireless access node within a network characterizing uncoordinated interference is disclosed. One method includes the wireless node collecting air-time usage history as perceived by the wireless access node. The wireless access node receives air-time usage history as perceived by at least one neighboring wireless node. The wireless access node comparatively analyzes the collected air-time usage and the received air-time usage.Type: ApplicationFiled: August 31, 2007Publication date: March 5, 2009Inventors: Kevin Weil, Peter Behroozi, Cyrus Behroozi
-
Publication number: 20080261535Abstract: An apparatus and method of detecting underperforming antennas of a wireless node of a wireless network are disclosed. The method includes measuring a wireless link quality between a first antenna of the wireless node and a receiver, and measuring a wireless link quality between a second antenna of the wireless node and the receiver. A difference between the wireless link quality of the first antenna and the link quality of the second antenna is determined. The wireless node is identified as having an underperforming antenna, if the difference between the wireless link qualities between the first antenna and the second antenna is greater than a faulty antenna detection threshold.Type: ApplicationFiled: April 23, 2007Publication date: October 23, 2008Inventors: Kevin Weil, Wenge Ren
-
Publication number: 20080247327Abstract: Methods of correlating wireless network performance of a wireless network are disclosed. One method includes collecting wireless network performance parameters at a location of the network, observing at least one of activities and conditions of the wireless network over the period of time, and correlating the wireless network performance parameters with at least one of the activities and conditions of the wireless network. The wireless network performance parameters can be collected by one or more test devices operating at nodes or clients within the wireless network.Type: ApplicationFiled: July 26, 2007Publication date: October 9, 2008Inventors: Kevin Weil, Mukesh Gupta, Amit Saha, Cyrus Behroozi, Devabhaktuni Srikrishna