Patents by Inventor Selim Aissi

Selim Aissi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10255444
    Abstract: The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device.
    Type: Grant
    Filed: November 30, 2017
    Date of Patent: April 9, 2019
    Assignee: Visa International Service Association
    Inventors: Selim Aissi, Taeho Kgil, Gyan Prakash
  • Patent number: 10250593
    Abstract: Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be used to facilitate user authentication and data encryption. For some embodiments, a method is disclosed comprising determining an image-based derived key, wherein the image-based derived key is generated from a selection of authentication images chosen by a user, encrypting data using the image-based derived key, and transmitting the encrypted data.
    Type: Grant
    Filed: August 15, 2017
    Date of Patent: April 2, 2019
    Assignee: Visa International Service Association
    Inventors: Selim Aissi, Taeho Kgil, Ajit Gaddam
  • Patent number: 10244105
    Abstract: Methods and systems to display, in real time, detailed attribute information regarding a calling party. This information may be presented to a user in conjunction with an incoming voice-call or message on the user's smartphone/mobile internet device (MID) or other mobile device. Such information can help him/her in real-time to decide whether to respond to the communication. Attribute information is collected at a caller attributes processing server and communicated to a receiver device of the called party.
    Type: Grant
    Filed: April 6, 2016
    Date of Patent: March 26, 2019
    Assignee: Intel Corporation
    Inventors: Gyan Prakash, Selim Aissi, Saurabh Dadu
  • Publication number: 20190089774
    Abstract: Techniques for securely binding a software application to a communication device may include sending a set of device identifiers associated with the computing device to a server, receiving a server-generated dynamic device identifier that is generated based on the set of device identifiers; and storing the server-generated dynamic device identifier during initialization of the application. During runtime execution of the application, the application may receive a request to execute an application specific task.
    Type: Application
    Filed: November 15, 2018
    Publication date: March 21, 2019
    Inventors: Gyan Prakash, Selim Aissi, Rasta Mansour, Ajit Gaddam
  • Patent number: 10204227
    Abstract: Embodiments of the invention relate to systems and methods for providing an anonymization engine. One embodiment of the present invention relates to a method comprising receiving a message directed at a recipient computer located outside a secure area by a privacy computer located within a secure area. The privacy computer may identify private information using a plurality of privacy rules and anonymize the message according to the plurality of privacy rules. Another embodiment may be directed to a method comprising receiving a request for sensitive data from a requesting computer. An anonymization computer may determine a sensitive data record associated with the request and may anonymize the sensitive data record by performing at least two of: removing unnecessary sensitive data entries from the sensitive data record, masking the sensitive data entries to maintain format, separating the sensitive data entries into associated data groupings, and de-contexting the data.
    Type: Grant
    Filed: April 19, 2017
    Date of Patent: February 12, 2019
    Assignee: Visa International Service Association
    Inventors: Sekhar Nagasundaram, Selim Aissi
  • Patent number: 10178164
    Abstract: Techniques for securely binding a software application to a communication device may include sending a set of device identifiers associated with the computing device to a server, receiving a server-generated dynamic device identifier that is generated based on the set of device identifiers; and storing the server-generated dynamic device identifier during initialization of the application. During runtime execution of the application, the application may receive a request to execute an application specific task.
    Type: Grant
    Filed: August 31, 2015
    Date of Patent: January 8, 2019
    Assignee: Visa International Service Association
    Inventors: Gyan Prakash, Selim Aissi, Rasta Mansour, Ajit Gaddam
  • Patent number: 10164996
    Abstract: Embodiments of the present invention are directed at methods and systems for providing a low value token buffer using only low value tokens (i.e., tokens that cannot be used to conduct transactions) within an organization to reduce access to high value tokens (i.e., tokens that are directly tied to real credentials and can be used to conduct transactions) within the organization. Accordingly, whenever a high value token is received by the organization, the high value token is changed to a low value token while being used within the organization. The low value token may be transformed to high value token upon (or before) delivery outside the organization.
    Type: Grant
    Filed: March 10, 2016
    Date of Patent: December 25, 2018
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Ajit Gaddam, Selim Aissi
  • Publication number: 20180359100
    Abstract: A method for requesting a credential associated with token in a multiple token layer environment is disclosed. A tokenization certificate serves to validate the identity of a credential requestor and provide information about the requestor's authorization for de-tokenizing a token. Also, a public key in the tokenization certificate is used to encrypt the credential for secure transmission to the requestor.
    Type: Application
    Filed: June 20, 2018
    Publication date: December 13, 2018
    Inventors: Ajit Gaddam, Selim Aissi
  • Publication number: 20180352005
    Abstract: Systems, devices, apparatuses, and methods of the present invention distribute authentication across multiple users. A data sensitivity model can define the sensitivity of different types of data. When an application requests access to a particular data item, the sensitivity of that data item can be determined. If the data item has a low sensitivity, access to the data item can be granted, if the data item has a high sensitivity, the system can request authentication before granting access to-the data item.
    Type: Application
    Filed: July 19, 2018
    Publication date: December 6, 2018
    Inventors: Ajit Gaddam, Selim Aissi, Taeho Kgil
  • Patent number: 10038726
    Abstract: Systems, devices, apparatuses, and methods of the present invention distribute authentication across multiple users. A data sensitivity model can define the sensitivity of different types of data. When an application requests access to a particular data item, the sensitivity of that data item can be determined. If the data item has a low sensitivity, access to the data item can be granted. If the data item has a high sensitivity, the system can request authentication before granting access to the data item.
    Type: Grant
    Filed: June 12, 2014
    Date of Patent: July 31, 2018
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Ajit Gaddam, Selim Aissi, Taeho Kgil
  • Patent number: 10038563
    Abstract: A method for requesting a credential associated with token in a multiple token layer environment is disclosed. A tokenization certificate serves to validate the identity of a credential requestor and provide information about the requestor's authorization for de-tokenizing a token. Also, a public key in the tokenization certificate is used to encrypt the credential for secure transmission to the requestor.
    Type: Grant
    Filed: August 9, 2017
    Date of Patent: July 31, 2018
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Ajit Gaddam, Selim Aissi
  • Patent number: 10033683
    Abstract: Embodiments of techniques and systems for sharing user information between proximate devices are described. In embodiments, a first device may identify a physically-proximate device that may receive user information. Upon receiving an indication that a user of the first device may desire to share user information with a user of the second device, a determination may be made as to whether the two users have matching interests. In embodiments, the interest match determination may be made by a separate interest match evaluator. Upon determination of an interest match, the first device may then send a request to share user information to the second device. If a user of the second device approves the request, user information for the user of the first device may be shared with the user of the second device. Other embodiments may be described and claimed.
    Type: Grant
    Filed: December 28, 2011
    Date of Patent: July 24, 2018
    Assignee: Intel Corporation
    Inventors: Jim Baca, Tobias Kohlenberg, Burges Karkaria, Dennis Morgan, David Stanasolovich, Selim Aissi, Mark Price, Alan Ross
  • Patent number: 10002174
    Abstract: Embodiments of the invention are directed to systems and methods for maintaining coherency between different entities in a distributed system. A coherency module automatically detects a change in state in a first entity, wherein the change in state relates to a change in functional code in the first entity. A synchronization message is transmitted to a second entity to synchronize data in the second entity with data in the first entity as a result of the change in state. The second entity is configured to synchronize the data in the second entity with the data in the first entity after receiving the synchronization message.
    Type: Grant
    Filed: March 9, 2017
    Date of Patent: June 19, 2018
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Selim Aissi, Taeho Kgil
  • Patent number: 9978094
    Abstract: A method for providing a token revocation list is disclosed. The method includes maintaining a status for each of a plurality of tokens in a token revocation database. Token validation requests are received, and the statuses of payment tokens can be determined. Response messages with the statuses of the payment tokens are then sent to token status requesters so that they may make decisions on whether or not to use them to process transactions.
    Type: Grant
    Filed: October 10, 2014
    Date of Patent: May 22, 2018
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Ajit Gaddam, Selim Aissi, Sekhar Nagasundaram
  • Publication number: 20180107828
    Abstract: The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device.
    Type: Application
    Filed: November 30, 2017
    Publication date: April 19, 2018
    Inventors: Selim Aissi, Taeho Kgil, Gyan Prakash
  • Patent number: 9891698
    Abstract: A system may configure at least a low power engine (LPE) and network interface circuitry when transitioning from an active state to a low-power state. The network interface circuitry may be configured to receive information from a network and to store any received information containing audio information into a memory location. The LPE may be configured to monitor the memory location, to retrieve the stored information from the memory location, to generate audio information based on the stored information and to provide the audio information to audio circuitry for playback. It is also possible for the LPE to receive audio information from the audio circuitry, to generate information for transmission based on the audio information and to store the information into a second memory location. The network interface circuitry may then retrieve the stored information from the second memory location and transmit the information to the network.
    Type: Grant
    Filed: November 10, 2016
    Date of Patent: February 13, 2018
    Assignee: INTEL CORPORATION
    Inventors: Gyan Prakash, Guru Raj, Nagasubramanian Gurumoorthy, Selim Aissi
  • Patent number: 9870477
    Abstract: The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device.
    Type: Grant
    Filed: July 26, 2016
    Date of Patent: January 16, 2018
    Assignee: Visa International Service Association
    Inventors: Selim Aissi, Taeho Kgil, Gyan Prakash
  • Patent number: 9867043
    Abstract: A secure device enrollment process to enroll a mobile device for access to a service can include receiving an application package including an application used for accessing the service via the mobile device. The application authenticity and the application integrity of the downloaded application are determined. The device integrity of the mobile device is also determined. An automatic enrollment message digest is generated to facilitate enrollment of the mobile device. The enrolment message digest provides an association between the downloaded application, the mobile device, and user identifying information of a user of the mobile device; and is sent to a server associated with a service provider to enroll the mobile device for the service provided by the service provider.
    Type: Grant
    Filed: August 27, 2013
    Date of Patent: January 9, 2018
    Assignee: Visa International Service Association
    Inventor: Selim Aissi
  • Patent number: 9852479
    Abstract: A method for confirming that a user interacted with a resource provider before allowing the user to submit feedback associated with the resource provider is disclosed. A social network provider can query entities that are aware of the user's interaction history before activating a feedback function. Also, non-sensitive information can be used to identify the user.
    Type: Grant
    Filed: May 19, 2017
    Date of Patent: December 26, 2017
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Ajit Gaddam, Selim Aissi, Gyan Prakash
  • Publication number: 20170357885
    Abstract: A mobile phone is disclosed. The mobile phone may receive a first request to generate an initial scannable image, and a second request to generate modified scannable image. The modified scannable image can include a static portion that corresponds to a static portion of the initial scannable image. The modified scannable image may also include another portion that has a different appearance than a corresponding portion of the initial scannable image.
    Type: Application
    Filed: August 28, 2017
    Publication date: December 14, 2017
    Inventors: Ajit Gaddam, Gyan Prakash, Selim Aissi