Patents by Inventor Kim Cameron
Kim Cameron has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11961952Abstract: A secondary battery is provided for cycling between a charged and a discharged state, the secondary battery including a battery enclosure, an electrode assembly, carrier ions, a non-aqueous liquid electrolyte within the battery enclosure, and a set of electrode constraints. The set of electrode constraints includes a primary constraint system having first and second primary growth constraints and at least one primary connecting member, the first and second primary growth constraints separated from each other in the longitudinal direction, wherein the primary constraint array restrains growth of the electrode assembly in the longitudinal direction such that any increase in the Feret diameter of the electrode assembly in the longitudinal direction over 20 consecutive cycles of the secondary battery is less than 20%.Type: GrantFiled: September 6, 2022Date of Patent: April 16, 2024Assignee: Enovix CorporationInventors: Robert S. Busacca, Ashok Lahiri, Murali Ramasubramanian, Bruno A. Valdes, Gardner Cameron Dales, Christopher J. Spindt, Geoffrey Matthew Ho, Harrold J. Rust, III, James D. Wilcox, John F. Varni, Kim Han Lee, Nirav S. Shah, Richard J. Contreras, Lynn Van Erden, Vladimir Dioumaev
-
Publication number: 20230050460Abstract: Generating a verifiable pairwise claim. Receiving a request for issuing a verifiable claim that is associated with a subject entity and is verifiable by one or more verifying entities. The request includes at least an encrypted portion using a particular type of encryptography. Verifying that the subject entity is associated with a subject of the verifiable claim based on decrypting the encrypted portion using the particular type of cryptography. In response to verifying that the subject entity is associated with the subject of the verifiable claim, issuing the verifiable claim that is structured to be verifiable only by the one or more verifying entities.Type: ApplicationFiled: January 28, 2021Publication date: February 16, 2023Inventor: Kim CAMERON
-
Publication number: 20230028555Abstract: Generating and associating decentralized identifiers (DIDs) for a group of related devices. First, a device group DID is generated by generating a private key of the device group DID based on a seed and a first hardware identifier of at least one of the devices in the group. The device group DID is associated with the group of related devices. For each of the group of the related devices, a device DID is derived by generating a private key of the device DID based on a seed, a second hardware identifier of the corresponding device, and the device group DID. The device DID is then associated with the corresponding device. Further, a scope of permission is granted to the device group DID, and each device DID in the group is granted a subset of the scope of permission.Type: ApplicationFiled: January 28, 2021Publication date: January 26, 2023Inventor: Kim CAMERON
-
Patent number: 10609082Abstract: Methods for composable user journeys for user authentication via an identity experience framework are performed by systems and apparatuses. Initiating a user authentication process for an application triggers application calls for dynamic invocation of a specific identity policy, required by the application, of a number of identity policies managed by a host of the identity experience framework. User interfaces defined by the identity policies are provided from the host to the application for interaction by the user and entry of identity information needed to authenticate the user according to specified verification providers. Identity claims and token requests are provided from the application to the host which then authenticates the identity claims via the verification providers and mints a token that includes the claims required by the application, according to the identity policy. The application consumes the token to complete the token request and allow the user access to the application.Type: GrantFiled: November 10, 2017Date of Patent: March 31, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Raja Charu Vikram Kakumani, Brandon Murdoch, Ronald Bjones, Muhammad O. Iqbal, Kim Cameron
-
Publication number: 20190312865Abstract: Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user's interactions with the computing system. The technology may increase or decrease an authentication or authorization level based on the observations. The level can indicate what level of access the user should be granted. When the user or a component of the computing device initiates a request, an application or service can determine whether the level is sufficient to satisfy the request. If the level is insufficient, the application or service can prompt the user for credentials so that the user is actively authenticated. The technology may enable computing systems to “trust” authentication so that two proximate devices can share authentication levels.Type: ApplicationFiled: June 20, 2019Publication date: October 10, 2019Inventors: David J. STEEVES, Kim CAMERON, Todd L. CARPENTER, David FOSTER, Quentin S. MILLER
-
Patent number: 10389712Abstract: Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user's interactions with the computing system. The technology may increase or decrease an authentication or authorization level based on the observations. The level can indicate what level of access the user should be granted. When the user or a component of the computing device initiates a request, an application or service can determine whether the level is sufficient to satisfy the request. If the level is insufficient, the application or service can prompt the user for credentials so that the user is actively authenticated. The technology may enable computing systems to “trust” authentication so that two proximate devices can share authentication levels.Type: GrantFiled: March 29, 2017Date of Patent: August 20, 2019Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: David J. Steeves, Kim Cameron, Todd L. Carpenter, David Foster, Quentin S. Miller
-
Publication number: 20190149531Abstract: Methods for composable user journeys for user authentication via an identity experience framework are performed by systems and apparatuses. Initiating a user authentication process for an application triggers application calls for dynamic invocation of a specific identity policy, required by the application, of a number of identity policies managed by a host of the identity experience framework. User interfaces defined by the identity policies are provided from the host to the application for interaction by the user and entry of identity information needed to authenticate the user according to specified verification providers. Identity claims and token requests are provided from the application to the host which then authenticates the identity claims via the verification providers and mints a token that includes the claims required by the application, according to the identity policy. The application consumes the token to complete the token request and allow the user access to the application.Type: ApplicationFiled: November 10, 2017Publication date: May 16, 2019Inventors: Raja Charu Vikram Kakumani, Brandon Murdoch, Ronald Bjones, Muhammad O. Iqbal, Kim Cameron
-
Publication number: 20190149579Abstract: Methods for composable user journeys for user authentication via an identity experience framework are performed by systems and apparatuses. Initiating a user authentication process for an application triggers application calls for dynamic invocation of a specific identity policy, required by the application, of a number of identity policies managed by a host of the identity experience framework. User interfaces defined by the identity policies are provided from the host to the application for interaction by the user and entry of identity information needed to authenticate the user according to specified verification providers. Identity claims and token requests are provided from the application to the host which then authenticates the identity claims via the verification providers and mints a token that includes the claims required by the application, according to the identity policy. The application consumes the token to complete the token request and allow the user access to the application.Type: ApplicationFiled: November 10, 2017Publication date: May 16, 2019Inventors: Raja Charu Vikram Kakumani, Brandon Murdoch, Ronald Bjones, Muhammad O. Iqbal, Kim Cameron
-
Patent number: 9904912Abstract: Technology is described for protecting transactions. The technology may include a switching component that a user can employ to switch an associated mobile device into a secure mode so that a user can confirm the transaction. After initiating a transaction request, the user can confirm the transaction request by activating the switching component, which can cause the mobile device to switch into a secure mode. In the secure mode, the mobile device may prevent the mobile device from conducting various normal activities, such as executing applications, receiving input, providing output, and so forth. The switching component may disable other processing temporarily. Upon receiving the confirmation from the user, the switching component may send a confirmation communication to complete the transaction.Type: GrantFiled: June 3, 2015Date of Patent: February 27, 2018Assignee: Microsoft Technology Licensing, LLCInventors: David J. Steeves, Kim Cameron, Todd L. Carpenter, David Foster, Quentin S. Miller, Gregory D. Hartrell
-
Publication number: 20170330250Abstract: Machines, Processes, compositions of matter, and articles that include at least one input acceptance machine and at least one track data presentation device. In addition to the foregoing, other aspects are described in the claims, drawings, and text.Type: ApplicationFiled: October 24, 2016Publication date: November 16, 2017Applicant: Elwha, LLCInventors: Ali Arjomand, Kim Cameron, William Gates, Roderick A. Hyde, Muriel Y. Ishikawa, Jordin T. Kare, Max R. Levchin, Nathan P. Myhrvold, Tony S. Pan, Aaron Sparks, Russ Stein, Clarence T. Tegreene, Maurizio Vecchione, Lowell L. Wood, JR., Victoria Y.H. Wood
-
Publication number: 20170208061Abstract: Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user's interactions with the computing system. The technology may increase or decrease an authentication or authorization level based on the observations. The level can indicate what level of access the user should be granted. When the user or a component of the computing device initiates a request, an application or service can determine whether the level is sufficient to satisfy the request. If the level is insufficient, the application or service can prompt the user for credentials so that the user is actively authenticated. The technology may enable computing systems to “trust” authentication so that two proximate devices can share authentication levels.Type: ApplicationFiled: March 29, 2017Publication date: July 20, 2017Inventors: David J. Steeves, Kim Cameron, Todd L. Carpenter, David Foster, Quentin S. Miller
-
Patent number: 9641502Abstract: Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user's interactions with the computing system. The technology may increase or decrease an authentication or authorization level based on the observations. The level can indicate what level of access the user should be granted. When the user or a component of the computing device initiates a request, an application or service can determine whether the level is sufficient to satisfy the request. If the level is insufficient, the application or service can prompt the user for credentials so that the user is actively authenticated. The technology may enable computing systems to “trust” authentication so that two proximate devices can share authentication levels.Type: GrantFiled: September 25, 2014Date of Patent: May 2, 2017Assignee: Microsoft Technology Licensing, LLCInventors: David J. Steeves, Kim Cameron, Todd L. Carpenter, David Foster, Quentin S. Miller
-
Publication number: 20170046670Abstract: Machines, Processes, compositions of matter, and articles that include at least one input acceptance machine and at least one track data presentation device. In addition to the foregoing, other aspects are described in the claims, drawings, and text.Type: ApplicationFiled: October 24, 2016Publication date: February 16, 2017Applicant: Elwha LLCInventors: Ali Arjomand, Kim Cameron, William Gates, Roderick A. Hyde, Muriel Y. Ishikawa, Jordin T. Kare, Max R. Levchin, Nathan P. Myhrvold, Tony S. Pan, Aaron Sparks, Russ Stein, Clarence T. Tegreene, Maurizio Vecchione, Lowell L. Wood, JR., Victoria Y. H. Wood
-
Publication number: 20160379312Abstract: Machines, Processes, compositions of matter, and articles that include at least one input acceptance machine and at least one track data presentation device. In addition to the foregoing, other aspects are described in the claims, drawings, and text.Type: ApplicationFiled: June 22, 2016Publication date: December 29, 2016Applicant: Elwha, LLCInventors: Ali Arjomand, Kim Cameron, William Gates, Roderick A. Hyde, Muriel Y. Ishikawa, Jordin T. Kare, Max R. Levchin, Nathan P. Myhrvold, Tony S. Pan, Aaron Sparks, Russ Stein, Clarence T. Tegreene, Maurizio Vecchione, Lowell L. Wood, JR., Victoria Y. H. Wood
-
Patent number: 9521131Abstract: A system and method for controlling distribution and use of digital identity representations (“DIRs”) increases security, usability, and oversight of DIR use. A DIR stored on a first device may be obtained by a second device for use in satisfying the security policy of a relying party. Release of the DIR to the second device requires permission from a device or entity that may be different from the device or entity attempting to access the relying party. Further, the use of the DIR to obtain an identity token may separately require permission of even a different person or entity and may be conditioned upon receiving satisfactory information relating to the intended use of the DIR (e.g., the name of the relying party, type of operation being attempted, etc.). By controlling the distribution and use of DIRs, security of the principal's identity and supervisory control over a principal's activities are enhanced.Type: GrantFiled: February 10, 2014Date of Patent: December 13, 2016Assignee: Microsoft Technology Licensing, LLCInventors: John Shewchuk, Kim Cameron, Arun Nanda, Xiao Xie
-
Publication number: 20160358267Abstract: A method substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. A device substantially as shown and described the detailed description and/or drawings and/or elsewhere herein.Type: ApplicationFiled: February 26, 2016Publication date: December 8, 2016Inventors: Ali Arjomand, Kim Cameron, William Gates, Roderick A. Hyde, Muriel Y. Ishikawa, Jordin T. Kare, Max R. Levchin, Nathan P. Myhrvold, Tony S. Pan, Aaron Sparks, Russ Stein, Clarence T. Tegreene, Maurizio Vecchione, Lowell L. Wood, JR., Victoria Y.H. Wood
-
Publication number: 20160352717Abstract: A system and method for controlling distribution and use of digital identity representations (“DIRs”) increases security, usability, and oversight of DIR use. A DIR stored on a first device may be obtained by a second device for use in satisfying the security policy of a relying party. Release of the DIR to the second device requires permission from a device or entity that may be different from the device or entity attempting to access the relying party. Further, the use of the DIR to obtain an identity token may separately require permission of even a different person or entity and may be conditioned upon receiving satisfactory information relating to the intended use of the DIR (e.g., the name of the relying party, type of operation being attempted, etc.). By controlling the distribution and use of DIRs, security of the principal's identity and supervisory control over a principal's activities are enhanced.Type: ApplicationFiled: August 10, 2016Publication date: December 1, 2016Applicant: Microsoft Technology Licensing, LLCInventors: John Shewchuk, Kim Cameron, Arun Nanda, Xiao Xie
-
Patent number: 9444817Abstract: Aspects of the subject matter described herein relate to facilitating claim use in an identity framework. In aspects, a definition of a trust framework may be received and stored. A graphical interface may display a plurality of trust frameworks and allow an administrator to select which trust framework to instantiate. The graphical interface may also allow the administrator to define which rules of the trust framework to use in the instance of the trust framework. After receiving this information, the instance of the trust framework may be instantiated and configuration data provided to the administrator to allow the administrator to configure a Web service to invoke the instance of the trust framework to grant or deny access to the Web service.Type: GrantFiled: September 27, 2012Date of Patent: September 13, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Ronald John Kamiel Euphrasia Bjones, Kim Cameron, Anthony Joseph Nadalin
-
Publication number: 20150281200Abstract: Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or authorize a user based on observations of the user's interactions with the computing system. The technology may increase or decrease an authentication or authorization level based on the observations. The level can indicate what level of access the user should be granted. When the user or a component of the computing device initiates a request, an application or service can determine whether the level is sufficient to satisfy the request. If the level is insufficient, the application or service can prompt the user for credentials so that the user is actively authenticated. The technology may enable computing systems to “trust” authentication so that two proximate devices can share authentication levels.Type: ApplicationFiled: September 25, 2014Publication date: October 1, 2015Inventors: David J. Steeves, Kim Cameron, Todd L. Carpenter, David Foster, Quentin S. Miller
-
Publication number: 20150269537Abstract: Technology is described for protecting transactions. The technology may include a switching component that a user can employ to switch an associated mobile device into a secure mode so that a user can confirm the transaction. After initiating a transaction request, the user can confirm the transaction request by activating the switching component, which can cause the mobile device to switch into a secure mode. In the secure mode, the mobile device may prevent the mobile device from conducting various normal activities, such as executing applications, receiving input, providing output, and so forth. The switching component may disable other processing temporarily. Upon receiving the confirmation from the user, the switching component may send a confirmation communication to complete the transaction.Type: ApplicationFiled: June 3, 2015Publication date: September 24, 2015Inventors: David J. Steeves, Kim Cameron, Todd L. Carpenter, David Foster, Quentin S. Miller, Gregory D. Hartrell