Patents by Inventor Victor B. Lortz

Victor B. Lortz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140187149
    Abstract: Systems and methods directed to URI-based host to mobile device setup and pairing are described herein. A uniform resource identifier (URI) may be received from a host device. A request for an application associated with the host device and the wireless device may be transmitted based at least in part on the URI. The requested application may be received. An association with the host device may be established based at least in part on the application.
    Type: Application
    Filed: December 27, 2012
    Publication date: July 3, 2014
    Inventors: Victor B. Lortz, Somya Rathi
  • Patent number: 8769266
    Abstract: A method for assembling authorization certificate chains among an authorizer, a client, and a third party allows the client to retain control over third party access. The client stores a first certificate from the authorizer providing access to a protected resource and delegates some or all of the privileges in the first certificate to the third party in a second certificate. The client stores a universal resource identifier (URI) associated with both the first certificate and the third party and provides the second certificate and the URI to the third party. The third party requests access to the protected resource by providing the second certificate and the URI, without knowledge or possession of the first certificate. When the authorizer accesses the URI, the client provides the first certificate to the authorizer, so that the client retains control over the third party's access.
    Type: Grant
    Filed: July 16, 2009
    Date of Patent: July 1, 2014
    Assignee: Intel Corporation
    Inventor: Victor B. Lortz
  • Publication number: 20140139670
    Abstract: Systems and methods directed to augmenting advanced driver assistance systems (ADAS) features of a vehicle with image processing support in on-board vehicle platform are described herein. Images may be received from one or more image sensors associated with an ADAS of a vehicle. The received images may be processed. An action is determined based upon, at least in part, the processed images. A message is transmitted to an ADAS controller responsive to the determination.
    Type: Application
    Filed: November 16, 2012
    Publication date: May 22, 2014
    Inventors: VIJAY SARATHI KESAVAN, VICTOR B. LORTZ, ANAND P. RANGARAJAN, SOMYA RATHI
  • Publication number: 20140142948
    Abstract: Systems, methods, and computer program products directed to in-vehicle context formation are described. Data from one or more sources associated with a vehicle may be received. Context information may be identified, based upon, at least in part, the received data. Audio captured from the vehicle may be received. The context information may be processed based upon, at least in part, at least one of the data from the one or more sources or the received audio.
    Type: Application
    Filed: November 21, 2012
    Publication date: May 22, 2014
    Inventors: Somya Rathi, Victor B. Lortz
  • Publication number: 20140081860
    Abstract: Systems, methods, and apparatuses are directed to conducting online transactions by virtue of a near field communication (NFC) reading mechanism configured to contactlessly read NFC-compliant provisioning information including a monetary value. Moreover, logic is configured to initiate establishment of a communication link, automatically send a request message to confirm the read provisioning information via the communication link, store at least a portion of the provisioning information in a secure memory unit, and based on the confirmation of the provisioning information, automatically present on a display unit, the monetary value, selectable transaction options, and an online information resource link to accommodate execution of a selected transaction option.
    Type: Application
    Filed: September 17, 2012
    Publication date: March 20, 2014
    Inventors: Farid Adrangi, Victor B. Lortz
  • Publication number: 20140058583
    Abstract: In accordance with some embodiments, in response to the detection of a particular event, an event data recorder may enter a secure mode. In the secure mode, data from various peripherals is collected over a secure channel and stored in a secure memory within the event data recorder. That data may subsequently be read out under secure conditions with an assurance of reliability while the system is in a secure mode, it may continue to collect data in a non-secure mode in parallel.
    Type: Application
    Filed: December 30, 2011
    Publication date: February 27, 2014
    Inventors: Vijay Sarathi Kesavan, Ranjit S. Narjala, Xiangang Guo, Victor B. Lortz, Anand P. Rangarajan, Somya Rathi
  • Publication number: 20140059694
    Abstract: In accordance with some embodiments, data may be collected from vehicles, and then reported to various subscribers with different levels of access privileges and pursuant different levels of security. In some embodiments, the data may be authenticated by a cloud service without revealing the identity of vehicle owner. This may provide enhanced privacy. At the same time, some types of the data may be encrypted for security and privacy reasons. Different information may be provided under different circumstances to different subscribers, such as the government, family members, location based services providers, etc.
    Type: Application
    Filed: December 28, 2011
    Publication date: February 27, 2014
    Inventors: Victor B. Lortz, Anand P. Rangarajan, Xingang Guo, Somya Rathi, Vijay Sarathi Kesavan
  • Publication number: 20140045464
    Abstract: Techniques for monitoring information technology (IT) assets using mobile devices are described herein. The mobile device is configured to wirelessly communicate with the IT asset using a near field communications (NFC) standard used to communicate over short distances. The IT asset is configured to include a monitoring device that is operable in a low power mode as well as in a normal power mode to monitor security related parameters. An alarm is generated in response to detecting a breach in security of the IT asset and the mobile device is notified of the alarm. A user may use the mobile device to send an encrypted message to the IT asset and instruct it to operate in a lockout mode, thereby protecting the digital assets accessible via the IT asset from unauthorized use.
    Type: Application
    Filed: December 27, 2011
    Publication date: February 13, 2014
    Inventors: Farid Adrangi, Victor B. Lortz
  • Publication number: 20140033319
    Abstract: In accordance with some embodiments, information may be collected from processor-based devices after the processor-based devices have already been deployed. Moreover, in some cases, the information that is to be collected, the collection sources, and the handling of the data may be specified after the processor-based devices have already been deployed.
    Type: Application
    Filed: March 30, 2012
    Publication date: January 30, 2014
    Inventors: Vijay Sarathi Kesavan, Xiangang Guo, Victor B. Lortz, Anand P. Rangarajan, Somya Rathi
  • Publication number: 20140001265
    Abstract: An apparatus, system, and method to identify a region of an image including a barcode based on, at least in part, an entity specific feature associated with the barcode; detect a codeword boundary for the barcode based on, at least in part, an adaptive boundary determination mechanism; and decode the codeword based on, at least in part, a plurality of metrics associated with the entity.
    Type: Application
    Filed: June 29, 2012
    Publication date: January 2, 2014
    Inventors: Praveen Gopalakrishnan, Victor B. Lortz, Lei Yang
  • Publication number: 20140003727
    Abstract: Systems and methods may provide for receiving a query regarding an establishment, retrieving an output image from an image database in response to the query, and transmitting the output image to a mobile device. In one example, image data including a plurality of interior establishment images and a plurality of stocking area images are also received, wherein the image database may be constructed based on the received image data.
    Type: Application
    Filed: June 29, 2012
    Publication date: January 2, 2014
    Inventors: Victor B. Lortz, Praveen Gopalakrishnan
  • Publication number: 20140003655
    Abstract: Techniques and mechanisms for generating image data representing a storage region in a commercial establishment. In an embodiment, image recognition analysis of first image data detects a difference between respective states of inventory storage represented by different areas of a captured image. In another embodiment, other image data is generated to represent a modified version of the image, wherein, based on the detected difference, a filter is applied to only one two portions of the first image data.
    Type: Application
    Filed: June 29, 2012
    Publication date: January 2, 2014
    Inventors: Praveen Gopalakrishnan, Victor B. Lortz, William J. Colson, Bradley W. Corrion, Xingang Guo
  • Publication number: 20130311766
    Abstract: Techniques for configuring network security include obtaining non-packet flow information, evaluating a policy rule based on the obtained information, and proposing a security arrangement based on the evaluation. The non-packet flow information can include, for example, authentication information obtained during an Internet Key Exchange protocol session or information obtained from a layered service provider. Therefore, policies such as Internet Protocol security (IPsec) policies can be defined and implemented so that they more accurately reflect the network's security requirements.
    Type: Application
    Filed: September 14, 2012
    Publication date: November 21, 2013
    Inventors: Victor B. Lortz, Ylian Saint-Hilaire, James L. Jason, JR.
  • Publication number: 20130257631
    Abstract: In accordance with some embodiments, an automated system may be implemented in which alerts to drivers are automatically distributed and implemented at the driver's vehicle. Thus, in some embodiments, no involvement by the driver is needed and everything may be done in an automated fashion including filtering alerts and responding to alerts. In some embodiments, each vehicle need not provide its current location to the Amber Alert System, providing greater privacy in some cases.
    Type: Application
    Filed: November 30, 2011
    Publication date: October 3, 2013
    Applicant: INTEL CORPORATION
    Inventors: Anand P. Rangarajan, Victor B. Lortz, Somya Rathi, Vijay Sarathi Kesavan
  • Publication number: 20130262208
    Abstract: Advertising may be distributed over a location based peer-to-peer network. A first customer may send a received advertisement to other customers over a short range distribution system in some embodiments. An identifier of the first customer may be appended to the transmission. The identifier may be used to reward the first customer for the referral.
    Type: Application
    Filed: November 30, 2011
    Publication date: October 3, 2013
    Inventors: Anand P. Rangarajan, Victor B. Lortz, Vijay Sarathi Kesavan, Somya Rathi, Xingang Guo
  • Patent number: 8462667
    Abstract: A tunneled direct link set-up (TDLS) capable wireless network may comprise a router such as an access point (AP) and a plurality of stations (STA) including service consumer and service provider station. A service consumer station may generate and send a layer-2 query frame to the plurality of stations. A service provider station may generate a layer-2 service frame in response to receiving the layer-2 query frame. The service consumer station may discover the service provider station and the services offered by the service provider station based on the layer-2 service frame. Also, the service consumer may discover the service provider station using layer-2 query frame and may discover the services offered by the service provider station using higher layer service discovery procedure.
    Type: Grant
    Filed: August 13, 2012
    Date of Patent: June 11, 2013
    Assignee: Intel Corporation
    Inventors: Xiaohoag Gong, Victor B. Lortz, Tsung-Yuan Charles Tai
  • Publication number: 20130144628
    Abstract: Technologies for transferring Near Field Communications information on a computing device include storing information corresponding to services in a database on the computing device, receiving a voice input corresponding to a name of a requested service, and retrieving the information corresponding to the requested service from the database. Such technologies may also include loading the retrieved information corresponding to the requested service into a Near Field Communications tag emulated by the computing device and transferring the retrieved information to a portable computing device in response to the Near Field Communications tag being touched by a Near Field Communications reader of the portable computing device.
    Type: Application
    Filed: February 1, 2013
    Publication date: June 6, 2013
    Inventor: Victor B. Lortz
  • Patent number: 8386259
    Abstract: A method for combining speech recognition with near field communication (NFC) to enable a user to enter, store, and use web addresses on portable devices. A user of a portable device having a NFC reader, a voice input interface, a speech recognition system, and memory enables the NFC reader of the portable device to touch a NFC tag or reader found on an object. The object containing information of interest to a user of the portable device; wherein when the NFC reader and the NFC tag or reader touch, the portable device receives a URI and default keywords associated with the URI. The portable device stores the URI in a persistent storage of the portable device based on the default keywords, and date, time, and location of when and where the URI was obtained.
    Type: Grant
    Filed: December 28, 2006
    Date of Patent: February 26, 2013
    Assignee: Intel Corporation
    Inventor: Victor B. Lortz
  • Publication number: 20120300683
    Abstract: A tunneled direct link set-up (TDLS) capable wireless network may comprise a router such as an access point (AP) and a plurality of stations (STA) including service consumer and service provider station. A service consumer station may generate and send a layer-2 query frame to the plurality of stations. A service provider station may generate a layer-2 service frame in response to receiving the layer-2 query frame. The service consumer station may discover the service provider station and the services offered by the service provider station based on the layer-2 service frame. Also, the service consumer may discover the service provider station using layer-2 query frame and may discover the services offered by the service provider station using higher layer service discovery procedure.
    Type: Application
    Filed: August 13, 2012
    Publication date: November 29, 2012
    Applicant: Intel Corporation
    Inventors: Xiaohong Gong, Victor B. Lortz, Tsung-Yuan Charles Tai
  • Publication number: 20120252405
    Abstract: Applications are downloaded to a device from a cloud-based service by establishing trust with between the device and a host system. The host system and the cloud-based service have a pre-existing trust relationship.
    Type: Application
    Filed: May 27, 2011
    Publication date: October 4, 2012
    Inventors: Victor B. Lortz, Anand P. Rangarajan, Somya Rathi, Vijay Sarathi Kesavan