Patents by Inventor Selim Aissi
Selim Aissi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10255444Abstract: The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device.Type: GrantFiled: November 30, 2017Date of Patent: April 9, 2019Assignee: Visa International Service AssociationInventors: Selim Aissi, Taeho Kgil, Gyan Prakash
-
Patent number: 10250593Abstract: Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be used to facilitate user authentication and data encryption. For some embodiments, a method is disclosed comprising determining an image-based derived key, wherein the image-based derived key is generated from a selection of authentication images chosen by a user, encrypting data using the image-based derived key, and transmitting the encrypted data.Type: GrantFiled: August 15, 2017Date of Patent: April 2, 2019Assignee: Visa International Service AssociationInventors: Selim Aissi, Taeho Kgil, Ajit Gaddam
-
Patent number: 10244105Abstract: Methods and systems to display, in real time, detailed attribute information regarding a calling party. This information may be presented to a user in conjunction with an incoming voice-call or message on the user's smartphone/mobile internet device (MID) or other mobile device. Such information can help him/her in real-time to decide whether to respond to the communication. Attribute information is collected at a caller attributes processing server and communicated to a receiver device of the called party.Type: GrantFiled: April 6, 2016Date of Patent: March 26, 2019Assignee: Intel CorporationInventors: Gyan Prakash, Selim Aissi, Saurabh Dadu
-
Publication number: 20190089774Abstract: Techniques for securely binding a software application to a communication device may include sending a set of device identifiers associated with the computing device to a server, receiving a server-generated dynamic device identifier that is generated based on the set of device identifiers; and storing the server-generated dynamic device identifier during initialization of the application. During runtime execution of the application, the application may receive a request to execute an application specific task.Type: ApplicationFiled: November 15, 2018Publication date: March 21, 2019Inventors: Gyan Prakash, Selim Aissi, Rasta Mansour, Ajit Gaddam
-
Patent number: 10204227Abstract: Embodiments of the invention relate to systems and methods for providing an anonymization engine. One embodiment of the present invention relates to a method comprising receiving a message directed at a recipient computer located outside a secure area by a privacy computer located within a secure area. The privacy computer may identify private information using a plurality of privacy rules and anonymize the message according to the plurality of privacy rules. Another embodiment may be directed to a method comprising receiving a request for sensitive data from a requesting computer. An anonymization computer may determine a sensitive data record associated with the request and may anonymize the sensitive data record by performing at least two of: removing unnecessary sensitive data entries from the sensitive data record, masking the sensitive data entries to maintain format, separating the sensitive data entries into associated data groupings, and de-contexting the data.Type: GrantFiled: April 19, 2017Date of Patent: February 12, 2019Assignee: Visa International Service AssociationInventors: Sekhar Nagasundaram, Selim Aissi
-
Patent number: 10178164Abstract: Techniques for securely binding a software application to a communication device may include sending a set of device identifiers associated with the computing device to a server, receiving a server-generated dynamic device identifier that is generated based on the set of device identifiers; and storing the server-generated dynamic device identifier during initialization of the application. During runtime execution of the application, the application may receive a request to execute an application specific task.Type: GrantFiled: August 31, 2015Date of Patent: January 8, 2019Assignee: Visa International Service AssociationInventors: Gyan Prakash, Selim Aissi, Rasta Mansour, Ajit Gaddam
-
Patent number: 10164996Abstract: Embodiments of the present invention are directed at methods and systems for providing a low value token buffer using only low value tokens (i.e., tokens that cannot be used to conduct transactions) within an organization to reduce access to high value tokens (i.e., tokens that are directly tied to real credentials and can be used to conduct transactions) within the organization. Accordingly, whenever a high value token is received by the organization, the high value token is changed to a low value token while being used within the organization. The low value token may be transformed to high value token upon (or before) delivery outside the organization.Type: GrantFiled: March 10, 2016Date of Patent: December 25, 2018Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Ajit Gaddam, Selim Aissi
-
Publication number: 20180359100Abstract: A method for requesting a credential associated with token in a multiple token layer environment is disclosed. A tokenization certificate serves to validate the identity of a credential requestor and provide information about the requestor's authorization for de-tokenizing a token. Also, a public key in the tokenization certificate is used to encrypt the credential for secure transmission to the requestor.Type: ApplicationFiled: June 20, 2018Publication date: December 13, 2018Inventors: Ajit Gaddam, Selim Aissi
-
Publication number: 20180352005Abstract: Systems, devices, apparatuses, and methods of the present invention distribute authentication across multiple users. A data sensitivity model can define the sensitivity of different types of data. When an application requests access to a particular data item, the sensitivity of that data item can be determined. If the data item has a low sensitivity, access to the data item can be granted, if the data item has a high sensitivity, the system can request authentication before granting access to-the data item.Type: ApplicationFiled: July 19, 2018Publication date: December 6, 2018Inventors: Ajit Gaddam, Selim Aissi, Taeho Kgil
-
Patent number: 10038726Abstract: Systems, devices, apparatuses, and methods of the present invention distribute authentication across multiple users. A data sensitivity model can define the sensitivity of different types of data. When an application requests access to a particular data item, the sensitivity of that data item can be determined. If the data item has a low sensitivity, access to the data item can be granted. If the data item has a high sensitivity, the system can request authentication before granting access to the data item.Type: GrantFiled: June 12, 2014Date of Patent: July 31, 2018Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Ajit Gaddam, Selim Aissi, Taeho Kgil
-
Patent number: 10038563Abstract: A method for requesting a credential associated with token in a multiple token layer environment is disclosed. A tokenization certificate serves to validate the identity of a credential requestor and provide information about the requestor's authorization for de-tokenizing a token. Also, a public key in the tokenization certificate is used to encrypt the credential for secure transmission to the requestor.Type: GrantFiled: August 9, 2017Date of Patent: July 31, 2018Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Ajit Gaddam, Selim Aissi
-
Patent number: 10033683Abstract: Embodiments of techniques and systems for sharing user information between proximate devices are described. In embodiments, a first device may identify a physically-proximate device that may receive user information. Upon receiving an indication that a user of the first device may desire to share user information with a user of the second device, a determination may be made as to whether the two users have matching interests. In embodiments, the interest match determination may be made by a separate interest match evaluator. Upon determination of an interest match, the first device may then send a request to share user information to the second device. If a user of the second device approves the request, user information for the user of the first device may be shared with the user of the second device. Other embodiments may be described and claimed.Type: GrantFiled: December 28, 2011Date of Patent: July 24, 2018Assignee: Intel CorporationInventors: Jim Baca, Tobias Kohlenberg, Burges Karkaria, Dennis Morgan, David Stanasolovich, Selim Aissi, Mark Price, Alan Ross
-
Patent number: 10002174Abstract: Embodiments of the invention are directed to systems and methods for maintaining coherency between different entities in a distributed system. A coherency module automatically detects a change in state in a first entity, wherein the change in state relates to a change in functional code in the first entity. A synchronization message is transmitted to a second entity to synchronize data in the second entity with data in the first entity as a result of the change in state. The second entity is configured to synchronize the data in the second entity with the data in the first entity after receiving the synchronization message.Type: GrantFiled: March 9, 2017Date of Patent: June 19, 2018Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Selim Aissi, Taeho Kgil
-
Patent number: 9978094Abstract: A method for providing a token revocation list is disclosed. The method includes maintaining a status for each of a plurality of tokens in a token revocation database. Token validation requests are received, and the statuses of payment tokens can be determined. Response messages with the statuses of the payment tokens are then sent to token status requesters so that they may make decisions on whether or not to use them to process transactions.Type: GrantFiled: October 10, 2014Date of Patent: May 22, 2018Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Ajit Gaddam, Selim Aissi, Sekhar Nagasundaram
-
Publication number: 20180107828Abstract: The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device.Type: ApplicationFiled: November 30, 2017Publication date: April 19, 2018Inventors: Selim Aissi, Taeho Kgil, Gyan Prakash
-
Patent number: 9891698Abstract: A system may configure at least a low power engine (LPE) and network interface circuitry when transitioning from an active state to a low-power state. The network interface circuitry may be configured to receive information from a network and to store any received information containing audio information into a memory location. The LPE may be configured to monitor the memory location, to retrieve the stored information from the memory location, to generate audio information based on the stored information and to provide the audio information to audio circuitry for playback. It is also possible for the LPE to receive audio information from the audio circuitry, to generate information for transmission based on the audio information and to store the information into a second memory location. The network interface circuitry may then retrieve the stored information from the second memory location and transmit the information to the network.Type: GrantFiled: November 10, 2016Date of Patent: February 13, 2018Assignee: INTEL CORPORATIONInventors: Gyan Prakash, Guru Raj, Nagasubramanian Gurumoorthy, Selim Aissi
-
Patent number: 9870477Abstract: The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device.Type: GrantFiled: July 26, 2016Date of Patent: January 16, 2018Assignee: Visa International Service AssociationInventors: Selim Aissi, Taeho Kgil, Gyan Prakash
-
Patent number: 9867043Abstract: A secure device enrollment process to enroll a mobile device for access to a service can include receiving an application package including an application used for accessing the service via the mobile device. The application authenticity and the application integrity of the downloaded application are determined. The device integrity of the mobile device is also determined. An automatic enrollment message digest is generated to facilitate enrollment of the mobile device. The enrolment message digest provides an association between the downloaded application, the mobile device, and user identifying information of a user of the mobile device; and is sent to a server associated with a service provider to enroll the mobile device for the service provided by the service provider.Type: GrantFiled: August 27, 2013Date of Patent: January 9, 2018Assignee: Visa International Service AssociationInventor: Selim Aissi
-
Patent number: 9852479Abstract: A method for confirming that a user interacted with a resource provider before allowing the user to submit feedback associated with the resource provider is disclosed. A social network provider can query entities that are aware of the user's interaction history before activating a feedback function. Also, non-sensitive information can be used to identify the user.Type: GrantFiled: May 19, 2017Date of Patent: December 26, 2017Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Ajit Gaddam, Selim Aissi, Gyan Prakash
-
Publication number: 20170357885Abstract: A mobile phone is disclosed. The mobile phone may receive a first request to generate an initial scannable image, and a second request to generate modified scannable image. The modified scannable image can include a static portion that corresponds to a static portion of the initial scannable image. The modified scannable image may also include another portion that has a different appearance than a corresponding portion of the initial scannable image.Type: ApplicationFiled: August 28, 2017Publication date: December 14, 2017Inventors: Ajit Gaddam, Gyan Prakash, Selim Aissi