Patents by Inventor Selim Aissi

Selim Aissi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170346806
    Abstract: Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be used to facilitate user authentication and data encryption. For some embodiments, a method is disclosed comprising determining an image-based derived key, wherein the image-based derived key is generated from a selection of authentication images chosen by a user, encrypting data using the image-based derived key, and transmitting the encrypted data.
    Type: Application
    Filed: August 15, 2017
    Publication date: November 30, 2017
    Inventors: Selim Aissi, Taeho Kgil, Ajit Gaddam
  • Publication number: 20170338965
    Abstract: A method for requesting a credential associated with token in a multiple token layer environment is disclosed. A tokenization certificate serves to validate the identity of a credential requestor and provide information about the requestor's authorization for de-tokenizing a token. Also, a public key in the tokenization certificate is used to encrypt the credential for secure transmission to the requestor.
    Type: Application
    Filed: August 9, 2017
    Publication date: November 23, 2017
    Inventors: Ajit Gaddam, Selim Aissi
  • Patent number: 9807066
    Abstract: Techniques from the proposed invention relate to providing enhanced security. For example, techniques described herein allow a computer system, such as a mobile device, to support a wide variety of security functions and security sensitive applications on a mobile device by providing enhanced security via secure input and output data transmission and verification through a secure module. The secure module may cause user interfaces to be provided to users by providing obfuscated user interface data to the operating system that do not reveal elements that are part of the user interfaces. The secure module may receive obfuscated user input values representing user input values, and de-obfuscate these user input values, whereby the actual input values are not exposed to the underlying operating system. The secure module may track the flow of user input/output data through the computing device to ensure the integrity and authenticity of this data.
    Type: Grant
    Filed: October 12, 2016
    Date of Patent: October 31, 2017
    Assignee: Visa International Service Association
    Inventors: Selim Aissi, Taeho Kgil, Gyan Prakash
  • Patent number: 9798335
    Abstract: An apparatus for adaptive thermal management of a device with user configuration capability, including a secure memory configured to store a thermal management policy; thermal monitoring circuitry configured to monitor thermal states associated with one or more sensor sub-systems of the device; and policy enforcement circuitry configured to implement the stored thermal management policy in response to the monitored thermal state violating a thermal threshold.
    Type: Grant
    Filed: December 29, 2011
    Date of Patent: October 24, 2017
    Assignee: Intel Corporation
    Inventors: Rajesh Poornachandran, Selim Aissi
  • Patent number: 9780953
    Abstract: A method for requesting a credential associated with token in a multiple token layer environment is disclosed. A tokenization certificate serves to validate the identity of a credential requestor and provide information about the requestor's authorization for de-tokenizing a token. Also, a public key in the tokenization certificate is used to encrypt the credential for secure transmission to the requestor.
    Type: Grant
    Filed: July 22, 2015
    Date of Patent: October 3, 2017
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Ajit Gaddam, Selim Aissi
  • Patent number: 9779345
    Abstract: A mobile phone is disclosed. The mobile phone may receive a first request to generate an initial scannable image, and a second request to generate modified scannable image. The modified scannable image can include a static portion that corresponds to a static portion of the initial scannable image. The modified scannable image may also include another portion that has a different appearance than a corresponding portion of the initial scannable image.
    Type: Grant
    Filed: August 11, 2015
    Date of Patent: October 3, 2017
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Ajit Gaddam, Gyan Prakash, Selim Aissi
  • Patent number: 9779399
    Abstract: Systems and methods for sharing an e-wallet are disclosed. In some embodiments, the systems and methods may share an e-wallet among multiple users on a single device. In other embodiments, the systems and method may share an e-wallet among multiple devices and/or multiple users on multiple devices. In some instances, an remotely stored e-wallet may be used or leveraged by an e-wallet uncertified device.
    Type: Grant
    Filed: December 22, 2011
    Date of Patent: October 3, 2017
    Assignee: INTEL CORPORATION
    Inventors: Rajesh Poornachandran, Gyan Prakash, Shahrokh Shahidzadeh, Selim Aissi, Ravikiran Chukka
  • Patent number: 9769156
    Abstract: Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be used to facilitate user authentication and data encryption. For some embodiments, a method is disclosed comprising determining an image-based derived key, wherein the image-based derived key is generated from a selection of authentication images chosen by a user, encrypting data using the image-based derived key, and transmitting the encrypted data.
    Type: Grant
    Filed: November 22, 2016
    Date of Patent: September 19, 2017
    Assignee: Visa International Service Association
    Inventors: Selim Aissi, Taeho Kgil, Ajit Gaddam
  • Publication number: 20170262942
    Abstract: A method for confirming that a user interacted with a resource provider before allowing the user to submit feedback associated with the resource provider is disclosed. A social network provider can query entities that are aware of the user's interaction history before activating a feedback function. Also, non-sensitive information can be used to identify the user.
    Type: Application
    Filed: May 19, 2017
    Publication date: September 14, 2017
    Inventors: Ajit Gaddam, Selim Aissi, Gyan Prakash
  • Publication number: 20170262341
    Abstract: A method, apparatus, and system are disclosed. In one embodiment, the method determines whether one or more manageability conditions are present in a computer system, and then invokes an out-of-service manageability remediation environment stored within a portion of a flash device in the computer system when one or more manageability conditions are present.
    Type: Application
    Filed: March 27, 2017
    Publication date: September 14, 2017
    Inventors: Selim Aissi, Hani Elgebaly, Venkat Gokulrangan, Ayeshwarya B. Mahajan, Jasmeet Chhabra
  • Publication number: 20170255920
    Abstract: A method, device, and system for conducting trusted payment transactions including establishing a trust relationship between a first mobile computing device and a second mobile computing device. The first mobile computing device may initiate a payment transaction with a point-of-sale device, communicate with the second mobile communication device to retrieve payment information from the second mobile communication device, and complete the payment transaction with the point-of-sale device using the payment information. The second mobile computing device is configured to verify the user and identity of the first mobile computing device prior to providing the payment information. Communications between the mobile computing devices may be encrypted using pre-determined encryption techniques.
    Type: Application
    Filed: May 24, 2017
    Publication date: September 7, 2017
    Inventors: Gyan Prakash, Selim Aissi
  • Publication number: 20170220818
    Abstract: Embodiments of the invention relate to systems and methods for providing an anonymization engine. One embodiment of the present invention relates to a method comprising receiving a message directed at a recipient computer located outside a secure area by a privacy computer located within a secure area. The privacy computer may identify private information using a plurality of privacy rules and anonymize the message according to the plurality of privacy rules. Another embodiment may be directed to a method comprising receiving a request for sensitive data from a requesting computer. An anonymization computer may determine a sensitive data record associated with the request and may anonymize the sensitive data record by performing at least two of: removing unnecessary sensitive data entries from the sensitive data record, masking the sensitive data entries to maintain format, separating the sensitive data entries into associated data groupings, and de-contexting the data.
    Type: Application
    Filed: April 19, 2017
    Publication date: August 3, 2017
    Inventors: Sekhar Nagasundaram, Selim Aissi
  • Publication number: 20170222988
    Abstract: A device, system, and method for providing processor-based data protection on a mobile computing device includes accessing data stored in memory with a central processing unit of the mobile computing device and determining that the accessed data is encrypted data based on a data included in one or more control registers of the central processing unit. If the data is determined to be encrypted data, the central processing unit is to decrypt the encrypted data using a cryptographic key stored in the central processing unit. The encrypted data may also be stored on a drive of the mobile computing device. The encryption state of the data stored on the drive is maintained in a drive encryption table, which is used to update a memory page tables and the one or more control registers.
    Type: Application
    Filed: February 13, 2017
    Publication date: August 3, 2017
    Inventors: Gyan Prakash, Jason M. Fung, Cris Rhodes, Selim Aissi
  • Patent number: 9713008
    Abstract: A system and method for user certificate initiation, distribution, and provisioning in converged WLAN-WWAN interworking networks. A computing device operable in a wireless local area network sends a public key to a mobile device operable in a wireless cellular wide area network. The mobile device performs a bootstrapping procedure with a cellular operator in the wireless cellular wide area network to obtain a user certificate based on the public key. The mobile device sends the user certificate to the computing device for installation on the computing device. The user certificate may be used for digital signature, verification, and encryption purposes. The user certificate is also used in both the wireless local area network and the wireless wide area network for authenticating a subscriber when accessing services from both networks.
    Type: Grant
    Filed: March 7, 2016
    Date of Patent: July 18, 2017
    Assignee: Intel Corporation
    Inventors: Selim Aissi, Mrudula Yelamanchi, Abhay Dharmadhikari, Benjamin Matasar, Jane Dashevsky
  • Patent number: 9691109
    Abstract: A method for confirming that a user interacted with a resource provider before allowing the user to submit feedback associated with the resource provider is disclosed. A social network provider can query entities that are aware of the user's interaction history before activating a feedback function. Also, non-sensitive information can be used to identify the user.
    Type: Grant
    Filed: September 24, 2015
    Date of Patent: June 27, 2017
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Ajit Gaddam, Selim Aissi, Gyan Prakash
  • Publication number: 20170177694
    Abstract: Embodiments of the invention are directed to systems and methods for maintaining coherency between different entities in a distributed system. A coherency module automatically detects a change in state in a first entity, wherein the change in state relates to a change in functional code in the first entity. A synchronization message is transmitted to a second entity to synchronize data in the second entity with data in the first entity as a result of the change in state, The second entity is configured to synchronize the data in the second entity with the data in the first entity after receiving the synchronization message.
    Type: Application
    Filed: March 9, 2017
    Publication date: June 22, 2017
    Inventors: Selim Aissi, Taeho Kgil
  • Patent number: 9665864
    Abstract: A method, device, and system for conducting trusted payment transactions including establishing a trust relationship between a first mobile computing device and a second mobile computing device. The first mobile computing device may initiate a payment transaction with a point-of-sale device, communicate with the second mobile communication device to retrieve payment information from the second mobile communication device, and complete the payment transaction with the point-of-sale device using the payment information. The second mobile computing device is configured to verify the user and identity of the first mobile computing device prior to providing the payment information. Communications between the mobile computing devices may be encrypted using pre-determined encryption techniques.
    Type: Grant
    Filed: May 21, 2010
    Date of Patent: May 30, 2017
    Assignee: Intel Corporation
    Inventors: Gyan Prakash, Selim Aissi
  • Patent number: 9665722
    Abstract: Embodiments of the invention relate to systems and methods for providing an anonymization engine. One embodiment of the present invention relates to a method comprising receiving a message directed at a recipient computer located outside a secure area by a privacy computer located within a secure area. The privacy computer may identify private information using a plurality of privacy rules and anonymize the message according to the plurality of privacy rules. Another embodiment may be directed to a method comprising receiving a request for sensitive data from a requesting computer. An anonymization computer may determine a sensitive data record associated with the request and may anonymize the sensitive data record by performing at least two of: removing unnecessary sensitive data entries from the sensitive data record, masking the sensitive data entries to maintain format, separating the sensitive data entries into associated data groupings, and de-contexting the data.
    Type: Grant
    Filed: August 12, 2013
    Date of Patent: May 30, 2017
    Assignee: Visa International Service Association
    Inventors: Sekhar Nagasundaram, Selim Aissi
  • Patent number: 9654977
    Abstract: Contextual information associated with a mobile device can be automatically acquired using various sensors on the device. Based on the contextual information and an access control policy associated with an application on the mobile device, a level of access to the application can be determined. An entity may be identified, authenticated and authorized to gain full access, varying degree of restricted access or no access to the application based on the access control policy. Different applications may be provided different levels of access based on the access control policy associated with each application.
    Type: Grant
    Filed: November 18, 2013
    Date of Patent: May 16, 2017
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventor: Selim Aissi
  • Publication number: 20170123484
    Abstract: A system may configure at least a low power engine (LPE) and network interface circuitry when transitioning from an active state to a low-power state. The network interface circuitry may be configured to receive information from a network and to store any received information containing audio information into a memory location. The LPE may be configured to monitor the memory location, to retrieve the stored information from the memory location, to generate audio information based on the stored information and to provide the audio information to audio circuitry for playback. It is also possible for the LPE to receive audio information from the audio circuitry, to generate information for transmission based on the audio information and to store the information into a second memory location. The network interface circuitry may then retrieve the stored information from the second memory location and transmit the information to the network.
    Type: Application
    Filed: November 10, 2016
    Publication date: May 4, 2017
    Applicant: INTEL CORPORATION
    Inventors: Gyan Prakash, GURU RAJ, Nagasubramanian Gurumoorthy, Selim Aissi