Patents by Inventor Rifaat Shekh-Yusef

Rifaat Shekh-Yusef has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11646893
    Abstract: Systems and methods for detecting misuse of devices comprising: receiving, from a device, a message comprising a first hash of device data that is indicative of a current device location and usage; generating a second hash of stored data, the stored data being based on an expected location and usage associated with the device; comparing the first and second hashes; and when the first and second hashes do not match, generating an alert.
    Type: Grant
    Filed: July 30, 2021
    Date of Patent: May 9, 2023
    Assignee: Avaya, Inc.
    Inventors: Rifaat Shekh-Yusef, Gregory Pelton
  • Patent number: 11381558
    Abstract: Providing a blockchain device enrollment service includes creating an enrollment smart contract that controls access to a service by the device; creating a pools smart contract associated with managing a plurality of different endpoints, wherein the pools smart contract is registered with the enrollment smart contract; registering and configuring a manufacturer smart contract with the enrollment smart contract; and registering and configuring a service provider smart contract with the enrollment smart contract.
    Type: Grant
    Filed: October 18, 2019
    Date of Patent: July 5, 2022
    Assignee: Avaya Inc.
    Inventors: Rifaat Shekh-Yusef, John A. Young
  • Publication number: 20210359859
    Abstract: Systems and methods for detecting misuse of devices comprising: receiving, from a device, a message comprising a first hash of device data that is indicative of a current device location and usage; generating a second hash of stored data, the stored data being based on an expected location and usage associated with the device; comparing the first and second hashes; and when the first and second hashes do not match, generating an alert.
    Type: Application
    Filed: July 30, 2021
    Publication date: November 18, 2021
    Inventors: Rifaat Shekh-Yusef, Gregory Pelton
  • Patent number: 11115217
    Abstract: Systems and methods for detecting misuse of devices comprising: receiving, from a device, a message comprising a first hash of device data that is indicative of a current device location and usage; generating a second hash of stored data, the stored data being based on an expected location and usage associated with the device; comparing the first and second hashes; and when the first and second hashes do not match, generating an alert.
    Type: Grant
    Filed: November 21, 2018
    Date of Patent: September 7, 2021
    Assignee: Avaya Inc.
    Inventors: Rifaat Shekh-Yusef, Gregory Pelton
  • Publication number: 20210119994
    Abstract: Providing a blockchain device enrollment service includes creating an enrollment smart contract that controls access to a service by the device; creating a pools smart contract associated with managing a plurality of different endpoints, wherein the pools smart contract is registered with the enrollment smart contract; registering and configuring a manufacturer smart contract with the enrollment smart contract; and registering and configuring a service provider smart contract with the enrollment smart contract.
    Type: Application
    Filed: October 18, 2019
    Publication date: April 22, 2021
    Inventors: Rifaat Shekh-Yusef, John A. Young
  • Patent number: 10931719
    Abstract: A communication device sends a Session Initiation Protocol (SIP) INVITE message to establish a call. In response, the call is forked. For example, in parallel forking, the SIP INVITE may be sent to two different communication devices. The forking causes each communication device to send at least one provisional response message. In this case, first and second SIP provisional response messages are received that include Session Description Protocol (SDP) information for a media stream. A first media stream associated with one of the first or second SIP provisional response messages is received and played. A second media stream associated with the other one of the first or second SIP provisional response messages is received within a first time period. In response to receiving the second media stream within the first time period, the first media stream is discarded and the second media stream is played.
    Type: Grant
    Filed: April 20, 2015
    Date of Patent: February 23, 2021
    Assignee: Avaya Inc.
    Inventors: Mehmet C. Balasaygun, Gordon R. Brunson, Joel M. Ezell, Eric D. Cooper, Rifaat Shekh-Yusef
  • Patent number: 10783766
    Abstract: The methods and systems of the present disclosure can set at least one threshold for properties of at least one sound, where the at least one threshold comprises a first threshold, and where the at least one sound comprises a first sound received at a first device; monitor changes in properties of the first sound over time at the first device; detect a first violation of the first threshold for the first sound; and provide a first notification based on the detection of the first violation.
    Type: Grant
    Filed: August 27, 2018
    Date of Patent: September 22, 2020
    Assignee: Avaya Inc.
    Inventors: Rifaat Shekh-Yusef, John C. Lynch
  • Publication number: 20200162262
    Abstract: Systems and methods for detecting misuse of devices comprising: receiving, from a device, a message comprising a first hash of device data that is indicative of a current device location and usage; generating a second hash of stored data, the stored data being based on an expected location and usage associated with the device; comparing the first and second hashes; and when the first and second hashes do not match, generating an alert.
    Type: Application
    Filed: November 21, 2018
    Publication date: May 21, 2020
    Inventors: Rifaat Shekh-Yusef, Gregory Pelton
  • Patent number: 10601595
    Abstract: To secure an application, a request to establish a communication session with a client is received from the application, at a server. The server sends the request to establish the communication session to the client. The request to establish the communication session generates a request for a user to approve the application. If the request is approved, a client token is received. A certificate with a public key and a private key is created and the public key is sent to the application. An application token that is encrypted using the public key is received from the application. The application token is unencrypted using the private key and compared to the client token. In response to the unencrypted application token matching the client token, an approval message is sent to the client to establish the communication session. The application can then establish a secure communication session with the client.
    Type: Grant
    Filed: May 4, 2016
    Date of Patent: March 24, 2020
    Assignee: Avaya Inc.
    Inventor: Rifaat Shekh-Yusef
  • Publication number: 20200066133
    Abstract: The methods and systems of the present disclosure can set at least one threshold for properties of at least one sound, where the at least one threshold comprises a first threshold, and where the at least one sound comprises a first sound received at a first device; monitor changes in properties of the first sound over time at the first device; detect a first violation of the first threshold for the first sound; and provide a first notification based on the detection of the first violation.
    Type: Application
    Filed: August 27, 2018
    Publication date: February 27, 2020
    Inventors: Rifaat Shekh-Yusef, John C. Lynch
  • Publication number: 20190199704
    Abstract: A request to authenticate a user is received at an authentication system. The request to authenticate the user requires one or more non-numeric metrics to authenticate the user. For example, the one or more non-numeric metrics may include a user name, a password, and a fingerprint scan. The request to authenticate the user that requires the one or more non-numeric metrics is validated. In response to validating the request to authenticate the user that requires the one or more non-numeric metrics, a first numeric code is generated (e.g., a password). The first numeric code is used to grant access to a telephone that requires authentication via a numeric keypad. The first numeric code is sent and displayed to the user. The user can then access the telephone by providing the numeric code at the telephone.
    Type: Application
    Filed: December 26, 2017
    Publication date: June 27, 2019
    Inventors: Milos Pujic, Joel Ezell, Rifaat Shekh-Yusef
  • Publication number: 20180288035
    Abstract: Endpoints, such as Session Initial Protocol enabled telephones, are capable of being public network (e.g., Internet) devices and, as such, require security measures to protect the endpoints and components on a private network they may be attached to, such as a call center. By providing a self-signed certificate into an endpoint with hardcoded certificate authorities (CAs) that enable the phone to call a trusted location, namely a Device Enrollment Service (DES) having a verifiable record of the endpoint that, on endpoint startup, authentication actions may be performed and, is successful, the endpoint is permitted to “point to” other services that may allow the endpoint to be redirected or otherwise use a particular private network, such as that of a customer.
    Type: Application
    Filed: January 11, 2018
    Publication date: October 4, 2018
    Inventor: Rifaat Shekh-Yusef
  • Patent number: 10084797
    Abstract: A first login request of a user is received from a first login window. The first login request comprises a login name, a user identifier, and a challenge. The challenge is generated and received from a second login request to a product in a second login window. The user copies and pastes the challenge into the first login window. A central control system determines if the login name and the user identifier are valid. If the login name and user identifier are valid, a response to the challenge is generated based a private key and is displayed in the first login window. The response to the challenge is copied from the first login window and pasted as part of a second step the second login process. The second login process verifies the response to the challenge using a public key to allow the user access to the product.
    Type: Grant
    Filed: October 3, 2016
    Date of Patent: September 25, 2018
    Assignee: Extreme Networks, Inc.
    Inventors: Rifaat Shekh-Yusef, William T. Walker
  • Patent number: 10075494
    Abstract: A first Session Initiation Protocol (SIP) REFER message is sent by an application server to a User Agent (UA). A UA is typically in a communication device, such as a telephone or personal computer. The first SIP REFER message requests the UA to provide a unique Uniform Resource Identifier (URI) for an instance of a networked application. For example, a networked application may be a call recording application. In response to sending the first SIP REFER message, a SIP NOTIFY message with the URI for the instance of the networked application is received by the application server. The application server sends a second SIP REFER message to the UA using the URI. The second SIP REFER message includes information for managing a widget. A widget is object, such as a button or sound. The widget is then displayed or played on a communication device according to a set of rules.
    Type: Grant
    Filed: May 8, 2015
    Date of Patent: September 11, 2018
    Assignee: Avaya Inc.
    Inventors: Rifaat Shekh-Yusef, Gordon R. Brunson, Milos Pujic
  • Publication number: 20180097818
    Abstract: A first login request of a user is received from a first login window. The first login request comprises a login name, a user identifier, and a challenge. The challenge is generated and received from a second login request to a product in a second login window. The user copies and pastes the challenge into the first login window. A central control system determines if the login name and the user identifier are valid. If the login name and user identifier are valid, a response to the challenge is generated based a private key and is displayed in the first login window. The response to the challenge is copied from the first login window and pasted as part of a second step the second login process. The second login process verifies the response to the challenge using a public key to allow the user access to the product.
    Type: Application
    Filed: October 3, 2016
    Publication date: April 5, 2018
    Inventors: Rifaat Shekh-Yusef, William T. Walker
  • Publication number: 20170324561
    Abstract: To secure an application, a request to establish a communication session with a client is received from the application, at a server. The server sends the request to establish the communication session to the client. The request to establish the communication session generates a request for a user to approve the application. If the request is approved, a client token is received. A certificate with a public key and a private key is created and the public key is sent to the application. An application token that is encrypted using the public key is received from the application. The application token is unencrypted using the private key and compared to the client token. In response to the unencrypted application token matching the client token, an approval message is sent to the client to establish the communication session. The application can then establish a secure communication session with the client.
    Type: Application
    Filed: May 4, 2016
    Publication date: November 9, 2017
    Inventor: Rifaat Shekh-Yusef
  • Publication number: 20170054755
    Abstract: An event that changes the security of a communication session between communication endpoints is determined. The event that changes the security of the communication session between the communication endpoints occurs after the communication session is established. For example, the event may be where a user has enabled a speakerphone. In response to determining the event that changes the security of the communication session between the communication endpoints, a message is sent to the communication endpoints that indicates a changed security level. The communication endpoints display the changed security level to the participants of the communication session. For example, the changed security level when the speakerphone is enabled may indicate that the communication session is now unsecure.
    Type: Application
    Filed: August 21, 2015
    Publication date: February 23, 2017
    Inventors: Harsh V. Mendiratta, Gordon R. Brunson, Rifaat Shekh-Yusef
  • Patent number: 9544336
    Abstract: The system and method detect and properly handle a glare condition in a SIP communication session. A glare condition is where a communication device has two concurrent outstanding requests (typically an incoming and an outgoing request that have not be acknowledged) and needs to process one of the requests before processing the other request. To detect a glare condition, the system and method identify that an out-of-dialog SIP request is received while an outgoing SIP request is pending. In response to detecting the glare condition, a glare algorithm is initiated. The glare algorithm ensures that outstanding requests will be handled in a timely manner.
    Type: Grant
    Filed: June 4, 2014
    Date of Patent: January 10, 2017
    Assignee: Avaya Inc.
    Inventors: Mehmet Balasaygun, Eric Cooper, Harsh Mendiratta, Rifaat Shekh-Yusef
  • Publication number: 20160328128
    Abstract: A communication device gets a widget resource Uniform Resource Identifier (URI) from the network. The widget resource URI is used by the communication device to get a widget (i.e., a graphical user interface object) of a networked application that is displayed on the communication device. In response to getting the widget resource URI, the communication device downloads a context document from the widget resource URI. The context document defines the widget or a location of a widget document that defines the widget for use in the communication device. The communication device identifies an attachment point for the widget (i.e., a place to display the widget) that is associated with an activation of a device object (e.g., a window). The communication device determines that the attachment point is within a scope. In response to determining that attachment point is within the scope, the widget is displayed on the communication device.
    Type: Application
    Filed: May 26, 2015
    Publication date: November 10, 2016
    Inventors: Rifaat Shekh-Yusef, Gordon R. Brunson, Joel M. Ezell, Milos Pujic
  • Publication number: 20160330254
    Abstract: A first Session Initiation Protocol (SIP) REFER message is sent by an application server to a User Agent (UA). A UA is typically in a communication device, such as a telephone or personal computer. The first SIP REFER message requests the UA to provide a unique Uniform Resource Identifier (URI) for an instance of a networked application. For example, a networked application may be a call recording application. In response to sending the first SIP REFER message, a SIP NOTIFY message with the URI for the instance of the networked application is received by the application server. The application server sends a second SIP REFER message to the UA using the URI. The second SIP REFER message includes information for managing a widget. A widget is object, such as a button or sound. The widget is then displayed or played on a communication device according to a set of rules.
    Type: Application
    Filed: May 8, 2015
    Publication date: November 10, 2016
    Inventors: Rifaat Shekh-Yusef, Gordon R. Brunson, Milos Pujic