Patents by Inventor Thomas Ziola

Thomas Ziola has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210312474
    Abstract: A processor receives one or more types of marketing data including but not limited to SEO data, site crawl and log file data, web analytics data, competitor data, paid media spend & performance data, CDP, CRM, ABM, Ecommerce, internal search, and online-to-offline dataO2O. The received marketing data is processed by an optimization engine to calculate optimizations for URLs, pages, page components, page fragments, or websites, such types of optimizations including at least one of, removing duplicate content, optimizing tags and titles, optimizing mobile image and video media, optimizing product offers, optimizing calls to action, optimizing personalized content, optimizing marketing offers, or optimizing user experiences accessed through the use of a browser. A publisher processes the optimization into, each instruction associated with at least one of URLs, pages, page components, page fragments, or websites.
    Type: Application
    Filed: November 17, 2020
    Publication date: October 7, 2021
    Applicant: BrightEdge Technologies, Inc.
    Inventors: Sammy Yu, Lemuel Park, Meyyappan Alagappan, Jimmy Yu, Thomas Ziola
  • Patent number: 8782396
    Abstract: Physical Unclonable Functions (PUFs) for authentication can be implemented in a variety of electronic devices including FPGAs, RFIDs, and ASICs. In some implementations, challenge-response pairs corresponding to individual PUFs can be enrolled and used to determine authentication data, which may be managed in a database. Later when a target object with a PUF is intended to be authenticated a set (or subset) of challenges are applied to each PUF device to authenticate it and thus distinguish it from others. In some examples, authentication is achieved without requiring complex cryptography circuitry implemented on the device. Furthermore, an authentication station does not necessarily have to be in communication with an authority holding the authentication data when a particular device is to be authenticated.
    Type: Grant
    Filed: September 19, 2008
    Date of Patent: July 15, 2014
    Assignee: Verayo, Inc.
    Inventors: Thomas Ziola, Zdenek Paral, Srinivas Devadas, Gookwon Edward Suh, Vivek Khandelwal
  • Patent number: 7839278
    Abstract: A key is determined from a volatile response using circuitry on the device. The volatile response depend on process variation in fabrication of the device. Error control data that depends on the first volatile response can be computed, stored externally to the device, and then used to generate the key using a volatile response using the circuit. Applications of volatile keys include authentication and rights management for content and software.
    Type: Grant
    Filed: June 16, 2009
    Date of Patent: November 23, 2010
    Assignee: Verayo, Inc.
    Inventors: Srinivas Devadas, Thomas Ziola
  • Publication number: 20100272255
    Abstract: A field configurable device, such as an FPGA, supports secure field configuration without using non-volatile storage for cryptographic keys on the device and without requiring a continuous or ongoing power source to maintain a volatile storage on the device. The approach can be used to secure the configuration data such that it can in general be used on a single or a selected set of devices and/or encryption of the configuration data so that the encrypted configuration data can be exposed without compromising information encoded in the configuration data.
    Type: Application
    Filed: April 20, 2010
    Publication date: October 28, 2010
    Applicant: Verayo, Inc.
    Inventors: Srinivas Devadas, Thomas Ziola
  • Publication number: 20090254981
    Abstract: A key is determined from a volatile response using circuitry on the device. The volatile response depend on process variation in fabrication of the device. Error control data that depends on the first volatile response can be computed, stored externally to the device, and then used to generate the key using a volatile response using the circuit. Applications of volatile keys include authentication and rights management for content and software.
    Type: Application
    Filed: June 16, 2009
    Publication date: October 8, 2009
    Applicant: Verayo, Inc.
    Inventors: Srinivas Devadas, Thomas Ziola
  • Patent number: 7564345
    Abstract: A key is determined from a volatile response using circuitry on the device. The volatile response depend on process variation in fabrication of the device. Error control data that depends on the first volatile response can be computed, stored externally to the device, and then used to generate the key using a volatile response using the circuit. Applications of volatile keys include authentication and rights management for content and software.
    Type: Grant
    Filed: November 14, 2005
    Date of Patent: July 21, 2009
    Assignee: Verayo, Inc.
    Inventors: Srinivas Devadas, Thomas Ziola
  • Publication number: 20090083833
    Abstract: Physical Unclonable Functions (PUFs) for authentication can be implemented in a variety of electronic devices including FPGAs, RFIDs, and ASICs. In some implementations, challenge-response pairs corresponding to individual PUFs can be enrolled and used to determine authentication data, which may be managed in a database. Later when a target object with a PUF is intended to be authenticated a set (or subset) of challenges are applied to each PUF device to authenticate it and thus distinguish it from others. In some examples, authentication is achieved without requiring complex cryptography circuitry implemented on the device. Furthermore, an authentication station does not necessarily have to be in communication with an authority holding the authentication data when a particular device is to be authenticated.
    Type: Application
    Filed: September 19, 2008
    Publication date: March 26, 2009
    Applicant: Verayo, Inc.
    Inventors: Thomas Ziola, Zdenek Paral, Srinivas Devadas, Gookwon Edward Suh, Vivek Khandelwal
  • Publication number: 20080062940
    Abstract: Systems and methods for communication between local wireless networks and mobile devices and more particularly, to sending presence-based content to mobile devices over local wireless network access points. The method includes receiving notification that the mobile device has established a wireless network connection with a LWN through a WAP of the LWN; receiving a request from a content provider to send content through the WAP to the mobile device; allowing the content provider to send content to the mobile device through the WAP or other network connected to the mobile device. In one exemplary method, a wireless service provider or mobile device user can govern what content is sent to a mobile device.
    Type: Application
    Filed: August 17, 2007
    Publication date: March 13, 2008
    Applicant: Skypop.Inc.
    Inventors: Konstantin Othmer, Michael Ruf, Timo Bruck, Bruce Leak, Joseph Poletto, Thomas Ziola
  • Publication number: 20060210082
    Abstract: A key is determined from a volatile response using circuitry on the device. The volatile response depend on process variation in fabrication of the device. Error control data that depends on the first volatile response can be computed, stored externally to the device, and then used to generate the key using a volatile response using the circuit. Applications of volatile keys include authentication and rights management for content and software.
    Type: Application
    Filed: November 14, 2005
    Publication date: September 21, 2006
    Inventors: Srinivas Devadas, Thomas Ziola
  • Publication number: 20060209584
    Abstract: A field configurable device, such as an FPGA, supports secure field configuration without using non-volatile storage for cryptographic keys on the device and without requiring a continuous or ongoing power source to maintain a volatile storage on the device. The approach can be used to secure the configuration data such that it can in general be used on a single or a selected set of devices and/or encryption of the configuration data so that the encrypted configuration data can be exposed without compromising information encoded in the configuration data.
    Type: Application
    Filed: November 14, 2005
    Publication date: September 21, 2006
    Inventors: Srinivas Devadas, Thomas Ziola