Patents by Inventor Edward C. Giaimo
Edward C. Giaimo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11063936Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums for securing biometric data using an encryption technique that does not require key storage or distribution. In some examples, a first biometric template of a user is input into a function that selects or determines parameters (such as an encryption key) of an encryption function that is then used to encrypt a second biometric template of the user.Type: GrantFiled: August 7, 2018Date of Patent: July 13, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Amer A. Hassan, Edward C. Giaimo, III
-
Patent number: 11042222Abstract: Disclosed in some examples are display systems, methods, devices, and machine-readable mediums which provide for a gesture-based method for specifying a region of a display in which to show shared content. Also disclosed are pairing methods for associating the region of the display with a content source device, methods for sharing content within the region, and methods for providing input from the region back to the content source device.Type: GrantFiled: December 16, 2019Date of Patent: June 22, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Amer Aref Hassan, Michael T. Gilbert, Edward C. Giaimo, III
-
Publication number: 20210181938Abstract: Disclosed in some examples are display systems, methods, devices, and machine-readable mediums which provide for a gesture-based method for specifying a region of a display in which to show shared content. Also disclosed are pairing methods for associating the region of the display with a content source device, methods for sharing content within the region, and methods for providing input from the region back to the content source device.Type: ApplicationFiled: December 16, 2019Publication date: June 17, 2021Inventors: Amer Aref Hassan, Edward C. Giaimo, III
-
Publication number: 20210181852Abstract: Disclosed in some examples are display systems, methods, devices, and machine-readable mediums which provide for a gesture-based method for specifying a region of a display in which to show shared content. Also disclosed are pairing methods for associating the region of the display with a content source device, methods for sharing content within the region, and methods for providing input from the region back to the content source device.Type: ApplicationFiled: December 16, 2019Publication date: June 17, 2021Inventors: Amer Aref Hassan, Michael T. Gilbert, Edward C. Giaimo, III
-
Patent number: 10956558Abstract: Methods and systems for authenticating a user account based on a password are disclosed. In one aspect, a method includes receiving input defining a sequence of characters included in an entered password, ignoring characters between a first position in the sequence of characters and a second position in the sequence of characters, and validating the password based on non-ignored characters in the sequence of characters.Type: GrantFiled: October 31, 2018Date of Patent: March 23, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Amer A. Hassan, Edward C. Giaimo, III, Wei-Chen Chen
-
Publication number: 20210073520Abstract: A computing device stores a captured image as a transient image template when there is a failure in an image-based authentication of the captured image and the user of the computing device has provided user credentials that authorize the user to access the computing device. The transient image template may be used to further authorize the user to access the computing device during an established time period.Type: ApplicationFiled: October 30, 2020Publication date: March 11, 2021Inventors: Amer Aref HASSAN, Carlos A. PEREZ NAFARRATE, Edward C. GIAIMO, III
-
Patent number: 10922436Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums for securing biometric data using distance-preserving transformations. A distance-preserving transformation is a function which maps elements to the same or another metric space such that the distance between the elements in the new metric space is equal to the distance between the elements in the original metric space.Type: GrantFiled: August 7, 2018Date of Patent: February 16, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Amer A. Hassan, Edward C. Giaimo, III
-
Publication number: 20210021372Abstract: Disclosed are systems, methods, and non-transitory computer-readable media for improved data transmissions using puncturing and error correction encoding. A decoder receives an encoded data input that includes a set of individual values. The decoder performing a puncturing of the encoded data input, yielding a punctured encoded data input that includes a subset of the individual values from the set of individual values. The decoder determines whether the punctured encoded data input maps to any predetermined data outputs from a set of predetermined data outputs, and in response to determining that the punctured encoded data input maps to a predetermined data output from the set of predetermined data outputs, the decoder determines that the encoded data input corresponds to the predetermined data output.Type: ApplicationFiled: July 17, 2019Publication date: January 21, 2021Inventors: Amer Aref Hassan, Edward C. Giaimo, III, Russell Andrew Penar
-
Publication number: 20210021420Abstract: Disclosed are systems, methods, and non-transitory computer-readable media for secure authentication using puncturing. An authentication system receives an encoded obfuscated authentication credential as part of an authentication request and accesses a stored authentication credential. The authentication system performs a puncturing of the encoded obfuscated authentication credential. The resulting punctured authentication credential includes a subset of individual values from the encoded obfuscated authentication credential. The authentication determines whether the punctured encoded data input corresponds to at least a portion of the stored authentication credential. In response to determining that the punctured encoded data input corresponds to at least a portion of the stored authentication credential, the authentication system approves the authentication request.Type: ApplicationFiled: July 17, 2019Publication date: January 21, 2021Inventors: Amer Aref Hassan, Edward C. Giaimo, III, Russell Andrew Penar
-
Patent number: 10860840Abstract: A computing device stores an acquired image as a transient image template when there is a failure in an image-based authentication of the acquired image and the user of the computing device has provided user credentials that authorize the user to access the computing device. The transient image template may be used to further authorize the user to access the computing device during a predetermined time period. At the expiration of the predetermined time period, the computing device deletes the transient image template. The computing device then reverts to using a baseline image template for performing image-based authentication of the user. The transient image template may also be associated with a location such that the computing device uses the transient image template for image-based authentication when the computing device is at or near the location.Type: GrantFiled: November 14, 2018Date of Patent: December 8, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Amer A. Hassan, Edward C. Giaimo, III
-
Patent number: 10853628Abstract: A computing device stores an acquired image as a transient image template when there is a failure in an image-based authentication of the acquired image and the user of the computing device has provided user credentials that authorize the user to access the computing device. The transient image template may be used to further authorize the user to access the computing device during a predetermined time period. At the expiration of the predetermined time period, the computing device deletes the transient image template. The computing device then reverts to using a baseline image template for performing image-based authentication of the user. The transient image template may also be associated with a location such that the computing device uses the transient image template for image-based authentication when the computing device is at or near the location.Type: GrantFiled: November 14, 2018Date of Patent: December 1, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Amer A. Hassan, Carlos A. Perez Nafarrate, Edward C. Giaimo, III
-
Patent number: 10853609Abstract: A hybrid two-dimensional barcode reader decodes control features of the hybrid-two-dimensional barcode image, the control features corresponding to control features of a first formatting standard. The hybrid two-dimensional barcode reader extracts a data sequence from a data portion of the hybrid two-dimensional barcode image based on the decoded control features and a second data format different from a first data format of the first formatting standard to recover the first data set. The hybrid two-dimensional barcode reader may decode a second data set from the data portion of the two-dimensional barcode in the data encoding format of the first formatting standard. The hybrid two-dimensional barcode reader may also constellation decode the first data set.Type: GrantFiled: March 12, 2019Date of Patent: December 1, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Amer Aref Hassan, Whitney Janice Giaimo, Edward C. Giaimo, III
-
Publication number: 20200304497Abstract: Disclosed in some examples are methods, systems, devices, and machine-readable mediums for securing biometric data using an encryption technique that does not require key storage or distribution. In some examples, a first biometric template of a user is input into a function that selects or determines parameters (such as an encryption key) of an encryption function that is then used to encrypt a second biometric template of the user.Type: ApplicationFiled: June 10, 2020Publication date: September 24, 2020Inventors: Amer Aref Hassan, Edward C. Giaimo, III
-
Publication number: 20200293733Abstract: A hybrid two-dimensional barcode reader decodes control features of the hybrid-two-dimensional barcode image, the control features corresponding to control features of a first formatting standard. The hybrid two-dimensional barcode reader extracts a data sequence from a data portion of the hybrid two-dimensional barcode image based on the decoded control features and a second data format different from a first data format of the first formatting standard to recover the first data set. The hybrid two-dimensional barcode reader may decode a second data set from the data portion of the two-dimensional barcode in the data encoding format of the first formatting standard. The hybrid two-dimensional barcode reader may also constellation decode the first data set.Type: ApplicationFiled: March 12, 2019Publication date: September 17, 2020Inventors: Amer Aref Hassan, Whitney Janice Giaimo, Edward C. Giaimo, III
-
Publication number: 20200272716Abstract: Systems and methods may be used to authenticate a user using a first device (e.g., a collaboration device) and a second device (e.g., a device proximate to the collaboration device) For example, the first device may compare an authentication image of a user (captured by the second device) to an image captured by the first device (for example at a lower resolution or with a partial view). The user may be authenticated by the first device in response to identifying the user from the authentication image (e.g., by matching the authentication image to a reference image of the user) and determining a correlation between the authentication image and the captured image.Type: ApplicationFiled: February 21, 2019Publication date: August 27, 2020Inventors: Amer A. Hassan, Edward C. Giaimo, III
-
Patent number: 10756817Abstract: Disclosed in some examples, are optical devices, systems, and machine-readable mediums that send and receive multiple streams of data across a same optical communication path (e.g., a same fiber optic fiber) with a same wavelength using different light sources transmitting at different power levels—thereby increasing the bandwidth of each optical communication path. Each light source corresponding to each stream transmits at a same frequency and on the same optical communication path using a different power level. The receiver differentiates the data for each stream by applying one or more detection models to the photon counts observed at the receiver to determine likely bit assignments for each stream.Type: GrantFiled: April 18, 2019Date of Patent: August 25, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Amer Aref Hassan, Edward C. Giaimo, III
-
Publication number: 20200151430Abstract: A computing device stores an acquired image as a transient image template when there is a failure in an image-based authentication of the acquired image and the user of the computing device has provided user credentials that authorize the user to access the computing device. The transient image template may be used to further authorize the user to access the computing device during a predetermined time period. At the expiration of the predetermined time period, the computing device deletes the transient image template. The computing device then reverts to using a baseline image template for performing image-based authentication of the user. The transient image template may also be associated with a location such that the computing device uses the transient image template for image-based authentication when the computing device is at or near the location.Type: ApplicationFiled: November 14, 2018Publication date: May 14, 2020Inventors: Amer A. Hassan, Edward C. Giaimo, III
-
Publication number: 20200151431Abstract: A computing device stores an acquired image as a transient image template when there is a failure in an image-based authentication of the acquired image and the user of the computing device has provided user credentials that authorize the user to access the computing device. The transient image template may be used to further authorize the user to access the computing device during a predetermined time period. At the expiration of the predetermined time period, the computing device deletes the transient image template. The computing device then reverts to using a baseline image template for performing image-based authentication of the user. The transient image template may also be associated with a location such that the computing device uses the transient image template for image-based authentication when the computing device is at or near the location.Type: ApplicationFiled: November 14, 2018Publication date: May 14, 2020Inventors: Amer A. Hassan, Carlos A. Perez Nafarrate, Edward C. Giaimo, III
-
Patent number: 10650208Abstract: A two-dimensional barcode encoder generates the hybrid two-dimensional barcode image that has control features corresponding to control features of a first formatting standard. The barcode encoder encodes a first data set in a data portion of the two-dimensional barcode in a second format that is different from a data encoding format of the first formatting standard. The encoder may also encode a second data set in the data portion of the two-dimensional barcode in the data encoding format of the first formatting standard. The encoder may also constellation encode the first data set.Type: GrantFiled: March 12, 2019Date of Patent: May 12, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Amer Aref Hassan, Whitney Janice Giaimo, Edward C. Giaimo, III
-
Publication number: 20200134166Abstract: Methods and systems for authenticating a user account based on a password are disclosed. In one aspect, a method includes receiving input defining a sequence of characters included in an entered password, ignoring characters between a first position in the sequence of characters and a second position in the sequence of characters, and validating the password based on non-ignored characters in the sequence of characters.Type: ApplicationFiled: October 31, 2018Publication date: April 30, 2020Inventors: Amer A. Hassan, Edward C. Giaimo, III, Wei-Chen Chen