Patents by Inventor David Steeves
David Steeves has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9613205Abstract: A user may utilize an existing digital identity to authorize the user's access to security-enabled device operations, where the security-enabled device comprises a cryptographic chip. The device can receive a user authentication token from the digital user identification service, which authenticates a user's identity. Further, the security-enabled device can validate the user authentication token, and provide the user access to device security operations on the security-enabled device if the user authentication token is successfully validated, allowing the user to reset their security access information for the device.Type: GrantFiled: August 17, 2015Date of Patent: April 4, 2017Assignee: Microsoft Technology Licensing, LLCInventors: David Steeves, Rajesh Viswanathan, Todd Buiten, William J. Reid
-
Patent number: 9467824Abstract: A method and device for generating message notifications at a computing device is provided. The computing device receives a message indicator from a mobile device, the indicator associated with a message received by the mobile device. The computing device generates a first display representation of the received message indicator. Positioning information is determined from an input component. A second display representation is generated comprising at least a portion of the message received at the mobile device and an action area for performing a direct action in response to the received message when the determined positioning information satisfies a display criteria associated with the second display representation.Type: GrantFiled: June 28, 2013Date of Patent: October 11, 2016Assignee: BlackBerry LimitedInventors: Ryan David Steeves, Rudolph Ferdinand Ziegler, Alexander James Pedwysocki, Jonas Ove Arbsjö
-
Publication number: 20160226829Abstract: Embodiments described herein provide enhanced computer- and network-based systems and methods for providing data security with respect to computing services, such as a digital transaction service (DTS). Example embodiments further provide a discovery service that enables nodes that are included in, or otherwise communicatively coupled to, the DTS to actively or passively “discover” roles and keys associated with the nodes. These node roles are associated with the various services provided by the DTS.Type: ApplicationFiled: January 29, 2015Publication date: August 4, 2016Inventors: David Steeves, Allan Wetter
-
Publication number: 20160226830Abstract: Embodiments described herein provide enhanced computer- and network-based systems and methods for providing data security with respect to computing services, such as a digital transaction service (DTS). Example embodiments further provide a discovery service that enables nodes that are included in, or otherwise communicatively coupled to, the DTS to actively or passively “discover” roles and keys associated with the nodes. These node roles are associated with the various services provided by the DTS. A security module provides at least a portion of the security services.Type: ApplicationFiled: January 30, 2015Publication date: August 4, 2016Inventor: David Steeves
-
Publication number: 20160204946Abstract: A token or other storage device uses Internet identities to set file access attribute rights. Subsequently, requests to access a file can be controlled by confirming the Internet identity of the requestor by either validating the request with a known public key or retrieving the public key from an Internet identity provider. Files may be stored encrypted and may be re-encrypted with the public key associated with Internet identity making the request.Type: ApplicationFiled: March 22, 2016Publication date: July 14, 2016Inventors: Todd L. Carpenter, David Steeves, David Abzarian
-
Patent number: 9325705Abstract: A token or other storage device uses Internet identities to set file access attribute rights. Subsequently, requests to access a file can be controlled by confirming the Internet identity of the requestor by either validating the request with a known public key or retrieving the public key from an Internet identity provider. Files may be stored encrypted and may be re-encrypted with the public key associated with Internet identity making the request.Type: GrantFiled: October 27, 2014Date of Patent: April 26, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Todd L. Carpenter, David Steeves, David Abzarian
-
Publication number: 20160050642Abstract: A method of controlling a portable electronic device includes, in response to receipt of selection of an option to enter a do not disturb mode at the portable electronic device, suppressing notifications for the communications received at the portable electronic device while in the do not disturb mode. The method also includes, in response to exiting the do not disturb mode, discontinuing suppressing notifications for new communications received at the portable electronic device, providing an option to view the communications received at the portable electronic device while in the do not disturb mode and, in response to receipt of selection of the option to view the communications received while in the do not disturb mode, displaying a consolidated list of the communications received at the portable electronic device while in the do not disturb mode. The consolidated list includes a plurality of electronic communication types.Type: ApplicationFiled: August 14, 2014Publication date: February 18, 2016Inventors: David Andrew BROWN, Cody Bryant, Ryan David Steeves
-
Publication number: 20160021095Abstract: In one embodiment, a user authentication server may use geo-location tracking to determine whether to present an enhanced identity challenge. A communication interface 180 may receive a user login attempt by a user and a current location of the user login attempt. A data storage 150 may store a user location profile of the user. A processor 120 may execute a comparison of the current location to the user location profile. The communication interface 180 may present the user with an enhanced identity challenge before allowing user access based on the comparison.Type: ApplicationFiled: September 30, 2015Publication date: January 21, 2016Applicant: Microsoft Technology Licensing, LLCInventors: David Steeves, Luke Abrams, Hersh Dangayach, Eric Fleischman, Prabu Raju, Krishna Vitaldevara, Niyantha Shekar, Payoj Baral, Meenakshi Ramaswamy, Winfred Wong, Yordan Rouskov, Ramesh Manne
-
Publication number: 20150356290Abstract: A user may utilize an existing digital identity to authorize the user's access to security-enabled device operations, where the security-enabled device comprises a cryptographic chip. The device can receive a user authentication token from the digital user identification service, which authenticates a user's identity. Further, the security-enabled device can validate the user authentication token, and provide the user access to device security operations on the security-enabled device if the user authentication token is successfully validated, allowing the user to reset their security access information for the device.Type: ApplicationFiled: August 17, 2015Publication date: December 10, 2015Inventors: David Steeves, Rajesh Viswanathan, Todd Buiten, William J. Reid
-
Patent number: 9177125Abstract: In one embodiment, a user authentication server may use geo-location tracking to determine whether to present an enhanced identity challenge. A communication interface 180 may receive a user login attempt by a user and a current location of the user login attempt. A data storage 150 may store a user location profile of the user. A processor 120 may execute a comparison of the current location to the user location profile. The communication interface 180 may present the user with an enhanced identity challenge before allowing user access based on the comparison.Type: GrantFiled: July 6, 2011Date of Patent: November 3, 2015Assignee: Microsoft Technology Licensing, LLCInventors: David Steeves, Luke Abrams, Hersh Dangayach, Eric Fleischman, Prabu Raju, Krishna Vitaldevara, Niyantha Shekar, Payoj Baral, Meenakshi Ramaswamy, Winfred Wong, Yordan Rouskov, Ramesh Manne
-
Publication number: 20150301838Abstract: A system and method are provided for enabling customized notifications on an electronic device. The method comprises displaying a recommendation on the electronic device to create a custom notification for at least one communication type. The method also comprises enabling the custom notification to be created for the at least one communication type. The recommendation may be determined using usage data associated with the at least one communication type. The custom notification may be created by navigating to a custom notifications user interface. The custom notification may also be created by automatically determining at least one custom notification setting.Type: ApplicationFiled: April 17, 2014Publication date: October 22, 2015Applicant: BlackBerry LimitedInventor: Ryan David STEEVES
-
Patent number: 9112702Abstract: A user may utilize an existing digital identity to authorize the user's access to security-enabled device operations, where the security-enabled device comprises a cryptographic chip. The device can receive a user authentication token from the digital user identification service, which authenticates a user's identity. Further, the security-enabled device can validate the user authentication token, and provide the user access to device security operations on the security-enabled device if the user authentication token is successfully validated, allowing the user to reset their security access information for the device.Type: GrantFiled: April 29, 2009Date of Patent: August 18, 2015Assignee: Microsoft Technology Licensing, LLCInventors: David Steeves, Rajesh Viswanathan, Todd Buiten, William J. Reid
-
Publication number: 20150106908Abstract: A token or other storage device uses Internet identities to set file access attribute rights. Subsequently, requests to access a file can be controlled by confirming the Internet identity of the requestor by either validating the request with a known public key or retrieving the public key from an Internet identity provider. Files may be stored encrypted and may be re-encrypted with the public key associated with Internet identity making the request.Type: ApplicationFiled: October 27, 2014Publication date: April 16, 2015Inventors: Todd L. Carpenter, David Steeves, David Abzarian
-
Publication number: 20150004944Abstract: A method and device for generating message notifications at a computing device is provided. The computing device receives a message indicator from a mobile device, the indicator associated with a message received by the mobile device. The computing device generates a first display representation of the received message indicator. Positioning information is determined from an input component. A second display representation is generated comprising at least a portion of the message received at the mobile device and an action area for performing a direct action in response to the received message when the determined positioning information satisfies a display criteria associated with the second display representation.Type: ApplicationFiled: June 28, 2013Publication date: January 1, 2015Inventors: Ryan David STEEVES, Rudolph Ferdinand ZIEGLER, Alexander James PEDWYSOCKI, Jonas Ove ARBSJÖ
-
Publication number: 20150004945Abstract: A method and device for generating message notifications at a mobile device is provided. A current operating context of the mobile device is determined. A first display representation for the received message in accordance with notification display settings associated with the determined current operating context is determined. Gesture information from a touch input component is determined and a second display representation comprising at least a portion of the received message and an action area for performing a direct action in response to the received message in response to the determined gesture information is generated.Type: ApplicationFiled: June 28, 2013Publication date: January 1, 2015Inventors: Ryan David STEEVES, Rudolph Ferdinand ZIEGLER, Alexander James PEDWYSOCKI, Jonas Ove ARBSJÖ, Haobin LI
-
Patent number: 8914901Abstract: A storage token has a display and a keyboard, or other input device, that allows a user to view a request to access a memory location and enter a response to the request. The display allows presentation of details of the request, such as a pathname to a requested memory location, metadata describing a cryptographic key for use in a transaction confirmation, and/or transaction details which are awaiting verification by a credential stored on the token. The storage token may also include a cryptographic engine and a secure memory allowing signing data returned in response to the request.Type: GrantFiled: January 11, 2008Date of Patent: December 16, 2014Assignee: Microsoft CorporationInventors: David Steeves, Todd L. Carpenter, David Abzarian, Gregory Hartrell, Mark Myers
-
Patent number: 8898755Abstract: A token or other storage device uses Internet identities to set file access attribute rights. Subsequently, requests to access a file can be controlled by confirming the Internet identity of the requestor by either validating the request with a known public key or retrieving the public key from an Internet identity provider. Files may be stored encrypted and may be re-encrypted with the public key associated with Internet identity making the request.Type: GrantFiled: November 20, 2012Date of Patent: November 25, 2014Assignee: Microsoft CorporationInventors: Todd L. Carpenter, David Steeves, David Abzarian
-
Publication number: 20130065428Abstract: An electronic device, systems and methods are described for detecting whether there has been a proper cable connection when a plug is inserted into a socket. A pressure sensor configured to measure air pressure within the socket generates one or more pressure signals as a function of the air pressure, and a processor determines whether a proper cable connection has been made (whether the plug has been fully inserted into the socket) as a function of the pressure signals.Type: ApplicationFiled: September 13, 2011Publication date: March 14, 2013Applicant: RESEARCH IN MOTION LIMITEDInventors: Ryan David STEEVES, Mohamad El-Hage
-
Patent number: 8353015Abstract: A token or other storage device uses Internet identities to set file access attribute rights. Subsequently, requests to access a file can be controlled by confirming the Internet identity of the requester by either validating the request with a known public key or retrieving the public key from an Internet identity provider. Files may be stored encrypted and may be re-encrypted with the public key associated with Internet identity making the request.Type: GrantFiled: January 9, 2008Date of Patent: January 8, 2013Assignee: Microsoft CorporationInventors: Todd L. Carpenter, David Steeves, David Abzarian
-
Publication number: 20120304260Abstract: In one embodiment, a user authentication server may use geo-location tracking to determine whether to present an enhanced identity challenge. A communication interface 180 may receive a user login attempt by a user and a current location of the user login attempt. A data storage 150 may store a user location profile of the user. A processor 120 may execute a comparison of the current location to the user location profile. The communication interface 180 may present the user with an enhanced identity challenge before allowing user access based on the comparison.Type: ApplicationFiled: July 6, 2011Publication date: November 29, 2012Applicant: Microsoft CorporationInventors: David Steeves, Luke Abrams, Hersh Dangayach, Eric Fleischman, Prabu Raju, Krishna Vitaldevara, Niyantha Shekar, Payoj Baral, Meenakshi Ramaswamy, Winfred Wong, Yordan Rouskov, Ramesh Manne