Patents by Inventor Rifaat Shekh-Yusef
Rifaat Shekh-Yusef has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11646893Abstract: Systems and methods for detecting misuse of devices comprising: receiving, from a device, a message comprising a first hash of device data that is indicative of a current device location and usage; generating a second hash of stored data, the stored data being based on an expected location and usage associated with the device; comparing the first and second hashes; and when the first and second hashes do not match, generating an alert.Type: GrantFiled: July 30, 2021Date of Patent: May 9, 2023Assignee: Avaya, Inc.Inventors: Rifaat Shekh-Yusef, Gregory Pelton
-
Patent number: 11381558Abstract: Providing a blockchain device enrollment service includes creating an enrollment smart contract that controls access to a service by the device; creating a pools smart contract associated with managing a plurality of different endpoints, wherein the pools smart contract is registered with the enrollment smart contract; registering and configuring a manufacturer smart contract with the enrollment smart contract; and registering and configuring a service provider smart contract with the enrollment smart contract.Type: GrantFiled: October 18, 2019Date of Patent: July 5, 2022Assignee: Avaya Inc.Inventors: Rifaat Shekh-Yusef, John A. Young
-
Publication number: 20210359859Abstract: Systems and methods for detecting misuse of devices comprising: receiving, from a device, a message comprising a first hash of device data that is indicative of a current device location and usage; generating a second hash of stored data, the stored data being based on an expected location and usage associated with the device; comparing the first and second hashes; and when the first and second hashes do not match, generating an alert.Type: ApplicationFiled: July 30, 2021Publication date: November 18, 2021Inventors: Rifaat Shekh-Yusef, Gregory Pelton
-
Patent number: 11115217Abstract: Systems and methods for detecting misuse of devices comprising: receiving, from a device, a message comprising a first hash of device data that is indicative of a current device location and usage; generating a second hash of stored data, the stored data being based on an expected location and usage associated with the device; comparing the first and second hashes; and when the first and second hashes do not match, generating an alert.Type: GrantFiled: November 21, 2018Date of Patent: September 7, 2021Assignee: Avaya Inc.Inventors: Rifaat Shekh-Yusef, Gregory Pelton
-
Publication number: 20210119994Abstract: Providing a blockchain device enrollment service includes creating an enrollment smart contract that controls access to a service by the device; creating a pools smart contract associated with managing a plurality of different endpoints, wherein the pools smart contract is registered with the enrollment smart contract; registering and configuring a manufacturer smart contract with the enrollment smart contract; and registering and configuring a service provider smart contract with the enrollment smart contract.Type: ApplicationFiled: October 18, 2019Publication date: April 22, 2021Inventors: Rifaat Shekh-Yusef, John A. Young
-
Patent number: 10931719Abstract: A communication device sends a Session Initiation Protocol (SIP) INVITE message to establish a call. In response, the call is forked. For example, in parallel forking, the SIP INVITE may be sent to two different communication devices. The forking causes each communication device to send at least one provisional response message. In this case, first and second SIP provisional response messages are received that include Session Description Protocol (SDP) information for a media stream. A first media stream associated with one of the first or second SIP provisional response messages is received and played. A second media stream associated with the other one of the first or second SIP provisional response messages is received within a first time period. In response to receiving the second media stream within the first time period, the first media stream is discarded and the second media stream is played.Type: GrantFiled: April 20, 2015Date of Patent: February 23, 2021Assignee: Avaya Inc.Inventors: Mehmet C. Balasaygun, Gordon R. Brunson, Joel M. Ezell, Eric D. Cooper, Rifaat Shekh-Yusef
-
Patent number: 10783766Abstract: The methods and systems of the present disclosure can set at least one threshold for properties of at least one sound, where the at least one threshold comprises a first threshold, and where the at least one sound comprises a first sound received at a first device; monitor changes in properties of the first sound over time at the first device; detect a first violation of the first threshold for the first sound; and provide a first notification based on the detection of the first violation.Type: GrantFiled: August 27, 2018Date of Patent: September 22, 2020Assignee: Avaya Inc.Inventors: Rifaat Shekh-Yusef, John C. Lynch
-
Publication number: 20200162262Abstract: Systems and methods for detecting misuse of devices comprising: receiving, from a device, a message comprising a first hash of device data that is indicative of a current device location and usage; generating a second hash of stored data, the stored data being based on an expected location and usage associated with the device; comparing the first and second hashes; and when the first and second hashes do not match, generating an alert.Type: ApplicationFiled: November 21, 2018Publication date: May 21, 2020Inventors: Rifaat Shekh-Yusef, Gregory Pelton
-
Patent number: 10601595Abstract: To secure an application, a request to establish a communication session with a client is received from the application, at a server. The server sends the request to establish the communication session to the client. The request to establish the communication session generates a request for a user to approve the application. If the request is approved, a client token is received. A certificate with a public key and a private key is created and the public key is sent to the application. An application token that is encrypted using the public key is received from the application. The application token is unencrypted using the private key and compared to the client token. In response to the unencrypted application token matching the client token, an approval message is sent to the client to establish the communication session. The application can then establish a secure communication session with the client.Type: GrantFiled: May 4, 2016Date of Patent: March 24, 2020Assignee: Avaya Inc.Inventor: Rifaat Shekh-Yusef
-
Publication number: 20200066133Abstract: The methods and systems of the present disclosure can set at least one threshold for properties of at least one sound, where the at least one threshold comprises a first threshold, and where the at least one sound comprises a first sound received at a first device; monitor changes in properties of the first sound over time at the first device; detect a first violation of the first threshold for the first sound; and provide a first notification based on the detection of the first violation.Type: ApplicationFiled: August 27, 2018Publication date: February 27, 2020Inventors: Rifaat Shekh-Yusef, John C. Lynch
-
Publication number: 20190199704Abstract: A request to authenticate a user is received at an authentication system. The request to authenticate the user requires one or more non-numeric metrics to authenticate the user. For example, the one or more non-numeric metrics may include a user name, a password, and a fingerprint scan. The request to authenticate the user that requires the one or more non-numeric metrics is validated. In response to validating the request to authenticate the user that requires the one or more non-numeric metrics, a first numeric code is generated (e.g., a password). The first numeric code is used to grant access to a telephone that requires authentication via a numeric keypad. The first numeric code is sent and displayed to the user. The user can then access the telephone by providing the numeric code at the telephone.Type: ApplicationFiled: December 26, 2017Publication date: June 27, 2019Inventors: Milos Pujic, Joel Ezell, Rifaat Shekh-Yusef
-
Publication number: 20180288035Abstract: Endpoints, such as Session Initial Protocol enabled telephones, are capable of being public network (e.g., Internet) devices and, as such, require security measures to protect the endpoints and components on a private network they may be attached to, such as a call center. By providing a self-signed certificate into an endpoint with hardcoded certificate authorities (CAs) that enable the phone to call a trusted location, namely a Device Enrollment Service (DES) having a verifiable record of the endpoint that, on endpoint startup, authentication actions may be performed and, is successful, the endpoint is permitted to “point to” other services that may allow the endpoint to be redirected or otherwise use a particular private network, such as that of a customer.Type: ApplicationFiled: January 11, 2018Publication date: October 4, 2018Inventor: Rifaat Shekh-Yusef
-
Patent number: 10084797Abstract: A first login request of a user is received from a first login window. The first login request comprises a login name, a user identifier, and a challenge. The challenge is generated and received from a second login request to a product in a second login window. The user copies and pastes the challenge into the first login window. A central control system determines if the login name and the user identifier are valid. If the login name and user identifier are valid, a response to the challenge is generated based a private key and is displayed in the first login window. The response to the challenge is copied from the first login window and pasted as part of a second step the second login process. The second login process verifies the response to the challenge using a public key to allow the user access to the product.Type: GrantFiled: October 3, 2016Date of Patent: September 25, 2018Assignee: Extreme Networks, Inc.Inventors: Rifaat Shekh-Yusef, William T. Walker
-
Patent number: 10075494Abstract: A first Session Initiation Protocol (SIP) REFER message is sent by an application server to a User Agent (UA). A UA is typically in a communication device, such as a telephone or personal computer. The first SIP REFER message requests the UA to provide a unique Uniform Resource Identifier (URI) for an instance of a networked application. For example, a networked application may be a call recording application. In response to sending the first SIP REFER message, a SIP NOTIFY message with the URI for the instance of the networked application is received by the application server. The application server sends a second SIP REFER message to the UA using the URI. The second SIP REFER message includes information for managing a widget. A widget is object, such as a button or sound. The widget is then displayed or played on a communication device according to a set of rules.Type: GrantFiled: May 8, 2015Date of Patent: September 11, 2018Assignee: Avaya Inc.Inventors: Rifaat Shekh-Yusef, Gordon R. Brunson, Milos Pujic
-
Publication number: 20180097818Abstract: A first login request of a user is received from a first login window. The first login request comprises a login name, a user identifier, and a challenge. The challenge is generated and received from a second login request to a product in a second login window. The user copies and pastes the challenge into the first login window. A central control system determines if the login name and the user identifier are valid. If the login name and user identifier are valid, a response to the challenge is generated based a private key and is displayed in the first login window. The response to the challenge is copied from the first login window and pasted as part of a second step the second login process. The second login process verifies the response to the challenge using a public key to allow the user access to the product.Type: ApplicationFiled: October 3, 2016Publication date: April 5, 2018Inventors: Rifaat Shekh-Yusef, William T. Walker
-
Publication number: 20170324561Abstract: To secure an application, a request to establish a communication session with a client is received from the application, at a server. The server sends the request to establish the communication session to the client. The request to establish the communication session generates a request for a user to approve the application. If the request is approved, a client token is received. A certificate with a public key and a private key is created and the public key is sent to the application. An application token that is encrypted using the public key is received from the application. The application token is unencrypted using the private key and compared to the client token. In response to the unencrypted application token matching the client token, an approval message is sent to the client to establish the communication session. The application can then establish a secure communication session with the client.Type: ApplicationFiled: May 4, 2016Publication date: November 9, 2017Inventor: Rifaat Shekh-Yusef
-
Publication number: 20170054755Abstract: An event that changes the security of a communication session between communication endpoints is determined. The event that changes the security of the communication session between the communication endpoints occurs after the communication session is established. For example, the event may be where a user has enabled a speakerphone. In response to determining the event that changes the security of the communication session between the communication endpoints, a message is sent to the communication endpoints that indicates a changed security level. The communication endpoints display the changed security level to the participants of the communication session. For example, the changed security level when the speakerphone is enabled may indicate that the communication session is now unsecure.Type: ApplicationFiled: August 21, 2015Publication date: February 23, 2017Inventors: Harsh V. Mendiratta, Gordon R. Brunson, Rifaat Shekh-Yusef
-
Patent number: 9544336Abstract: The system and method detect and properly handle a glare condition in a SIP communication session. A glare condition is where a communication device has two concurrent outstanding requests (typically an incoming and an outgoing request that have not be acknowledged) and needs to process one of the requests before processing the other request. To detect a glare condition, the system and method identify that an out-of-dialog SIP request is received while an outgoing SIP request is pending. In response to detecting the glare condition, a glare algorithm is initiated. The glare algorithm ensures that outstanding requests will be handled in a timely manner.Type: GrantFiled: June 4, 2014Date of Patent: January 10, 2017Assignee: Avaya Inc.Inventors: Mehmet Balasaygun, Eric Cooper, Harsh Mendiratta, Rifaat Shekh-Yusef
-
Publication number: 20160328128Abstract: A communication device gets a widget resource Uniform Resource Identifier (URI) from the network. The widget resource URI is used by the communication device to get a widget (i.e., a graphical user interface object) of a networked application that is displayed on the communication device. In response to getting the widget resource URI, the communication device downloads a context document from the widget resource URI. The context document defines the widget or a location of a widget document that defines the widget for use in the communication device. The communication device identifies an attachment point for the widget (i.e., a place to display the widget) that is associated with an activation of a device object (e.g., a window). The communication device determines that the attachment point is within a scope. In response to determining that attachment point is within the scope, the widget is displayed on the communication device.Type: ApplicationFiled: May 26, 2015Publication date: November 10, 2016Inventors: Rifaat Shekh-Yusef, Gordon R. Brunson, Joel M. Ezell, Milos Pujic
-
Publication number: 20160330254Abstract: A first Session Initiation Protocol (SIP) REFER message is sent by an application server to a User Agent (UA). A UA is typically in a communication device, such as a telephone or personal computer. The first SIP REFER message requests the UA to provide a unique Uniform Resource Identifier (URI) for an instance of a networked application. For example, a networked application may be a call recording application. In response to sending the first SIP REFER message, a SIP NOTIFY message with the URI for the instance of the networked application is received by the application server. The application server sends a second SIP REFER message to the UA using the URI. The second SIP REFER message includes information for managing a widget. A widget is object, such as a button or sound. The widget is then displayed or played on a communication device according to a set of rules.Type: ApplicationFiled: May 8, 2015Publication date: November 10, 2016Inventors: Rifaat Shekh-Yusef, Gordon R. Brunson, Milos Pujic