Patents by Inventor Brian Lindauer

Brian Lindauer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250211433
    Abstract: The present disclosure provides protection to communications after establishing a secured connection to a secured website or application. An authentication service, after establishing a secured session, can calculate a trust score for a user. Based on the trust score, the security agent can encrypt access tokens used to authenticate a secure connection. The system can interrupt the secure connection based on the trust score of the user or the user device. The interruption takes place by ignoring requests to decrypt the access token. Without the decrypted access token, the browser is unable to authenticate the session, preventing further communications. After the user improves the security posture of the device or user, the security agent can recalculate the trust score. When the trust score is above a threshold, the security agent can being decrypting the access token, thereby authenticating communications from the browser.
    Type: Application
    Filed: March 11, 2025
    Publication date: June 26, 2025
    Inventors: Shayne Miel, Brian Lindauer, Glenn J. Stempeck, David William Matteson, Ian Edward Beals, Josh Matz, Edgar Calderon, Laura Cole
  • Patent number: 12316756
    Abstract: The present disclosure provides protection to communications after establishing a secured connection to a secured website or application. An authentication service, after establishing a secured session, can calculate a trust score for a user. Based on the trust score, the security agent can encrypt access tokens used to authenticate a secure connection. The system can interrupt the secure connection based on the trust score of the user or the user device. The interruption takes place by ignoring requests to decrypt the access token. Without the decrypted access token, the browser is unable to authenticate the session, preventing further communications. After the user improves the security posture of the device or user, the security agent can recalculate the trust score. When the trust score is above a threshold, the security agent can being decrypting the access token, thereby authenticating communications from the browser.
    Type: Grant
    Filed: January 19, 2023
    Date of Patent: May 27, 2025
    Assignee: Cisco Technology, Inc.
    Inventors: Shayne Miel, Brian Lindauer, Glenn J. Stempeck, David William Matteson, Ian Edward Beals, Josh Matz, Edgar Calderon, Laura Cole
  • Patent number: 12184642
    Abstract: This disclosure describes techniques and mechanisms for authenticating user device(s) by ensuring that two user devices accessing the same online service are co-located, while protecting private information associated with a user's network landscape and/or Bluetooth device(s). The techniques may ensure that a second factor authentication device is in the same location as a first factor access device, and that a first factor access device is in the same location as it was during previous access attempts).
    Type: Grant
    Filed: February 10, 2022
    Date of Patent: December 31, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Shayne Miel, Richard Edward Harang, Joshua Brian Lindauer
  • Publication number: 20240297887
    Abstract: The present technology provides for receiving communications at an authentication service, and the communication is indicative of a change in a security posture of an authenticated session between a user device and a secure service. The authentication service can then determine that the change in the security posture of the authenticated session impacts the trust level associated with the user device and causes the trust level to fall below the threshold. The authentication service can then send an enforcement signal to a security agent on a network device that provides remedial actions that a user can undertake to improve the security posture of the authenticated session.
    Type: Application
    Filed: March 2, 2023
    Publication date: September 5, 2024
    Inventors: Shayne Miel, Josh Matz, Nancy Cam-Winget, Joshua Terry, Brian Lindauer, David William Matteson, Jen Bammel, Courtney Irwin
  • Publication number: 20240250812
    Abstract: The present disclosure provides protection to communications after establishing a secured connection to a secured website or application. An authentication service, after establishing a secured session, can calculate a trust score for a user. Based on the trust score, the security agent can encrypt access tokens used to authenticate a secure connection. The system can interrupt the secure connection based on the trust score of the user or the user device. The interruption takes place by ignoring requests to decrypt the access token. Without the decrypted access token, the browser is unable to authenticate the session, preventing further communications. After the user improves the security posture of the device or user, the security agent can recalculate the trust score. When the trust score is above a threshold, the security agent can being decrypting the access token, thereby authenticating communications from the browser.
    Type: Application
    Filed: January 19, 2023
    Publication date: July 25, 2024
    Inventors: Shayne Miel, Brian Lindauer, Glenn J. Stempeck, David William Matteson, Ian Edward Beals, Josh Matz, Edgar Calderon, Laura Cole
  • Publication number: 20230254305
    Abstract: This disclosure describes techniques and mechanisms for authenticating user device(s) by ensuring that two user devices accessing the same online service are co-located, while protecting private information associated with a user's network landscape and/or Bluetooth device(s). The techniques may ensure that a second factor authentication device is in the same location as a first factor access device, and that a first factor access device is in the same location as it was during previous access attempts).
    Type: Application
    Filed: February 10, 2022
    Publication date: August 10, 2023
    Inventors: Shayne Miel, Richard Edward Harang, Joshua Brian Lindauer
  • Publication number: 20180240147
    Abstract: A process suitable for managing activation of market influencers while minimizing degradation of influencer impact is provided. In particular, the present invention relates to a process that determines an optimal amount of marketing activities to maximize effectiveness while avoiding damaging or degradation of influencer impact quantities providing the marketing activities. Specifically, the present invention provides a system and process for optimizing an amount of content presented to potential customers by incentivized influential entities or users. The optimization of the content is structured to “activate” the influential entities or users to provide as much content as possible to achieve the biggest impact from the user's social network before diminishing returns begin to take effect on the impact of the influential entities or users.
    Type: Application
    Filed: February 21, 2018
    Publication date: August 23, 2018
    Inventors: Lyle Robert Stevens, Sean Naegeli, Howard L. Greene, Brian Lindauer