Patents by Inventor Francois Goldfain

Francois Goldfain has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10263912
    Abstract: In an approach, a first application executing on a first computer acquires, one or more resources of the first computer, wherein the one or more resources include one or more shared resources that are shared among applications of the first computer. The first application receives a media stream from a second computer and presents playback of the media stream. In response to detecting that priority within the first computer has shifted to a second application, the first application pauses playback of the media stream and releases the one or more shared resources while retaining one or more remaining resources that relate to a session context. In response to detecting that priority has shifted back to the first application, the first application re-acquires the one or more shared resources and resumes playback of the media stream based on the one or more remaining resources.
    Type: Grant
    Filed: March 13, 2018
    Date of Patent: April 16, 2019
    Assignee: NETFLIX, INC.
    Inventors: Francois Goldfain, Shaomei Chen
  • Patent number: 10200360
    Abstract: User physical interaction characteristics information or the way a user physically interacts with a device is analyzed to aid in authenticating a user of a device. User physical interaction characteristics information such as swipe speed, finger area, finger conductivity, finger angle, device angle, movement patterns, acceleration, etc., provide signatures that are distinctive for particular individuals and possibly unique if measured to a sufficiently high level of precision. In some examples, a device measures finger positions, finger pad sizes, moisture level, acceleration, displacement, and changes in finger pad size for a particular user and compares the measurements to physical interaction characteristics measured during subsequent usage of the device to verify that a user is an authorized user.
    Type: Grant
    Filed: February 8, 2016
    Date of Patent: February 5, 2019
    Assignee: Dell Products L.P.
    Inventors: Vadim Draluk, Francois Goldfain, Avery Audrey Kwan, Jan-Willem Maarse
  • Publication number: 20180205667
    Abstract: In an approach, a first application executing on a first computer acquires, one or more resources of the first computer, wherein the one or more resources include one or more shared resources that are shared among applications of the first computer. The first application receives a media stream from a second computer and presents playback of the media stream. In response to detecting that priority within the first computer has shifted to a second application, the first application pauses playback of the media stream and releases the one or more shared resources while retaining one or more remaining resources that relate to a session context. In response to detecting that priority has shifted back to the first application, the first application re-acquires the one or more shared resources and resumes playback of the media stream based on the one or more remaining resources.
    Type: Application
    Filed: March 13, 2018
    Publication date: July 19, 2018
    Inventors: FRANCOIS GOLDFAIN, SHAOMEI CHEN
  • Patent number: 9917791
    Abstract: In an approach, a first application executing on a first computer acquires, one or more resources of the first computer, wherein the one or more resources include one or more shared resources that are shared among applications of the first computer. The first application receives a media stream from a second computer and presents playback of the media stream. In response to detecting that priority within the first computer has shifted to a second application, the first application pauses playback of the media stream and releases the one or more shared resources while retaining one or more remaining resources that relate to a session context. In response to detecting that priority has shifted back to the first application, the first application re-acquires the one or more shared resources and resumes playback of the media stream based on the one or more remaining resources.
    Type: Grant
    Filed: September 26, 2014
    Date of Patent: March 13, 2018
    Assignee: NETFLIX, INC.
    Inventors: Francois Goldfain, Shaomei Chen
  • Patent number: 9772875
    Abstract: Mechanisms are provided to allow devices to support multiple modes, such as work, personal, and family modes. Conventional mobile solutions provide only for mode distinctions at the application level, e.g. one work application may prevent access to certain data, but a different application may want to allow access to that same data. Existing computer system solutions rely on multiple operating system instances or multiple virtual machines. Framework level modes are provided that do not require different, mutually exclusive, or possibly conflicting applications or platforms. A device and associated applications may have access to different data and capabilities based on a current mode.
    Type: Grant
    Filed: November 29, 2011
    Date of Patent: September 26, 2017
    Assignee: Dell Products L.P.
    Inventors: Vadim Draluk, Francois Goldfain, Jan-Willem Marse, Geng Chen
  • Patent number: 9515819
    Abstract: Mechanisms are provided for allowing pluggable encryption in an operating system. Modules such as proprietary cipher modules connect to a kernel cryptographic framework using cryptographic cipher adapters. Supported cryptographic ciphers as well as proprietary cryptographic ciphers can be used in a transparent manner during file system access, key management, and metadata maintenance operations. Proprietary cipher modules interact with the cryptographic cipher adapters as though the cryptographic cipher adapters are the kernel cryptographic framework. The kernel cryptographic framework interacts with the cryptographic cipher adapters as though the cryptographic cipher adapters are proprietary cipher modules.
    Type: Grant
    Filed: September 3, 2015
    Date of Patent: December 6, 2016
    Assignee: Dell Products L.P.
    Inventors: Geng Chen, Vadim Draluk, Francois Goldfain
  • Patent number: 9509592
    Abstract: Mechanisms are provided to implement framework level mode specific file access operations. In a mode such as a work or enterprise mode, read and write accesses are directed to one or more secured locations. File data and metadata may be secured with encryption and/or authentication mechanisms. Conventional mobile solutions provide only for mode encryption distinctions at the application level, e.g. one work application may prevent access to certain data, but a different application may want to allow access to that same data. Various embodiments provide framework level mode sensitive encryption that does not require different, mutually exclusive, or possibly conflicting applications or platforms. A device and associated applications may have access to different data based on a current mode.
    Type: Grant
    Filed: February 8, 2016
    Date of Patent: November 29, 2016
    Assignee: Dell Products L.P.
    Inventors: Vadim Draluk, Francois Goldfain, Jan-Willem Maarse, Geng Chen
  • Publication number: 20160156547
    Abstract: Mechanisms are provided to implement framework level mode specific file access operations. In a mode such as a work or enterprise mode, read and write accesses are directed to one or more secured locations. File data and metadata may be secured with encryption and/or authentication mechanisms. Conventional mobile solutions provide only for mode encryption distinctions at the application level, e.g. one work application may prevent access to certain data, but a different application may want to allow access to that same data. Various embodiments provide framework level mode sensitive encryption that does not require different, mutually exclusive, or possibly conflicting applications or platforms. A device and associated applications may have access to different data based on a current mode.
    Type: Application
    Filed: February 8, 2016
    Publication date: June 2, 2016
    Applicant: Dell Products L.P.
    Inventors: Vadim Draluk, Francois Goldfain, Jan-Willem Maarse, Geng Chen
  • Publication number: 20160156618
    Abstract: User physical interaction characteristics information or the way a user physically interacts with a device is analyzed to aid in authenticating a user of a device. User physical interaction characteristics information such as swipe speed, finger area, finger conductivity, finger angle, device angle, movement patterns, acceleration, etc., provide signatures that are distinctive for particular individuals and possibly unique if measured to a sufficiently high level of precision. In some examples, a device measures finger positions, finger pad sizes, moisture level, acceleration, displacement, and changes in finger pad size for a particular user and compares the measurements to physical interaction characteristics measured during subsequent usage of the device to verify that a user is an authorized user.
    Type: Application
    Filed: February 8, 2016
    Publication date: June 2, 2016
    Applicant: Dell Products L.P.
    Inventors: Vadim Draluk, Francois Goldfain, Avery Audrey Kwan, Jan-Willem Maarse
  • Patent number: 9256758
    Abstract: Mechanisms are provided to implement framework level mode specific file access operations. In a mode such as a work or enterprise mode, read and write accesses are directed to one or more secured locations. File data and metadata may be secured with encryption and/or authentication mechanisms. Conventional mobile solutions provide only for mode encryption distinctions at the application level, e.g. one work application may prevent access to certain data, but a different application may want to allow access to that same data. Various embodiments provide framework level mode sensitive encryption that does not require different, mutually exclusive, or possibly conflicting applications or platforms. A device and associated applications may have access to different data based on a current mode.
    Type: Grant
    Filed: November 29, 2011
    Date of Patent: February 9, 2016
    Assignee: DELL PRODUCTS L.P.
    Inventors: Vadim Draluk, Francois Goldfain, Jan-Willem Maarse, Geng Chen
  • Patent number: 9256715
    Abstract: User physical interaction characteristics information or the way a user physically interacts with a device is analyzed to aid in authenticating a user of a device. User physical interaction characteristics information such as swipe speed, finger area, finger conductivity, finger angle, device angle, movement patterns, acceleration, etc., provide signatures that are distinctive for particular individuals and possibly unique if measured to a sufficiently high level of precision. In some examples, a device measures finger positions, finger pad sizes, moisture level, acceleration, displacement, and changes in finger pad size for a particular user and compares the measurements to physical interaction characteristics measured during subsequent usage of the device to verify that a user is an authorized user.
    Type: Grant
    Filed: March 9, 2012
    Date of Patent: February 9, 2016
    Assignee: Dell Products L.P.
    Inventors: Vadim Draluk, Francois Goldfain, Avery Audrey Kwan, Jan-Willem Maarse
  • Publication number: 20150381353
    Abstract: Mechanisms are provided for allowing pluggable encryption in an operating system. Modules such as proprietary cipher modules connect to a kernel cryptographic framework using cryptographic cipher adapters. Supported cryptographic ciphers as well as proprietary cryptographic ciphers can be used in a transparent manner during file system access, key management, and metadata maintenance operations. Proprietary cipher modules interact with the cryptographic cipher adapters as though the cryptographic cipher adapters are the kernel cryptographic framework. The kernel cryptographic framework interacts with the cryptographic cipher adapters as though the cryptographic cipher adapters are proprietary cipher modules.
    Type: Application
    Filed: September 3, 2015
    Publication date: December 31, 2015
    Applicant: Dell Products L.P.
    Inventors: Geng Chen, Vadim Draluk, Francois Goldfain
  • Patent number: 9152800
    Abstract: Mechanisms are provided for allowing pluggable encryption in an operating system. Modules such as proprietary cipher modules connect to a kernel cryptographic framework using cryptographic cipher adapters. Supported cryptographic ciphers as well as proprietary cryptographic ciphers can be used in a transparent manner during file system access, key management, and metadata maintenance operations. Proprietary cipher modules interact with the cryptographic cipher adapters as though the cryptographic cipher adapters are the kernel cryptographic framework. The kernel cryptographic framework interacts with the cryptographic cipher adapters as though the cryptographic cipher adapters are proprietary cipher modules.
    Type: Grant
    Filed: May 3, 2012
    Date of Patent: October 6, 2015
    Assignee: Dell Products L.P.
    Inventors: Geng Chen, Vadim Draluk, Francois Goldfain
  • Patent number: 9143943
    Abstract: Mode sensitive networking is provided to allow mode specific communications using a mobile device. If a device has an established secured connection and an application is running in work mode, packets are routed through the secure connection. If the device has an established secured connection but an application is running in personal mode, packets are routed through an alternate connection. Secured connections may be established by using privileged applications. A device and associated applications may have access to different servers, sites, and destinations based on a current mode.
    Type: Grant
    Filed: November 29, 2011
    Date of Patent: September 22, 2015
    Assignee: Dell Products L.P.
    Inventors: Vadim Draluk, Francois Goldfain, Jan-Willem Maarse, Geng Chen, Sean Xiao
  • Patent number: 9009856
    Abstract: Mechanisms are provided to allow particular parties and applications access to protected application programming interfaces (APIs) without the use of security domains. Trusted parties and applications may have access to protected APIs while unfrosted parties and applications may be restricted to a more limited set of APIs. Public keys associated with individual applications that are used to enforce licensing policies can be repurposed for use in a verification process to prevent unauthorized access to APIs. A credential storage manager can be used to maintain permission and certificate information. An application authorization manager may access credential storage and maintain trusted application information.
    Type: Grant
    Filed: December 16, 2011
    Date of Patent: April 14, 2015
    Assignee: Dell Products L.P.
    Inventors: Vadim Draluk, Francois Goldfain, Jan-Willem Maarse, Helen Bragg, Sean Xiao
  • Patent number: 8806610
    Abstract: Mechanisms are provided to efficiently and effectively authenticate a user of a device. Passcode information such as passwords, pins, and access codes are obtained along with biometric information to periodically authenticate a user of a device. A user identity confidence score may be generated and continually modified by using data such as passcode information, biometric information, and/or user physical interaction characteristics information. If the user identify confidence score falls beneath a particular threshold, additional user authentication information may be requested.
    Type: Grant
    Filed: January 31, 2012
    Date of Patent: August 12, 2014
    Assignee: Dell Products L.P.
    Inventors: Vadim Draluk, Francois Goldfain, Jan-Willem Maarse
  • Publication number: 20130294599
    Abstract: Mechanisms are provided for allowing pluggable encryption in an operating system. Modules such as proprietary cipher modules connect to a kernel cryptographic framework using cryptographic cipher adapters. Supported cryptographic ciphers as well as proprietary cryptographic ciphers can be used in a transparent manner during file system access, key management, and metadata maintenance operations. Proprietary cipher modules interact with the cryptographic cipher adapters as though the cryptographic cipher adapters are the kernel cryptographic framework. The kernel cryptographic framework interacts with the cryptographic cipher adapters as though the cryptographic cipher adapters are proprietary cipher modules.
    Type: Application
    Filed: May 3, 2012
    Publication date: November 7, 2013
    Applicant: DELL Products L.P.
    Inventors: Geng Chen, Vadim Draluk, Francois Goldfain
  • Publication number: 20130239206
    Abstract: User physical interaction characteristics information or the way a user physically interacts with a device is analyzed to aid in authenticating a user of a device. User physical interaction characteristics information such as swipe speed, finger area, finger conductivity, finger angle, device angle, movement patterns, acceleration, etc., provide signatures that are distinctive for particular individuals and possibly unique if measured to a sufficiently high level of precision. In some examples, a device measures finger positions, finger pad sizes, moisture level, acceleration, displacement, and changes in finger pad size for a particular user and compares the measurements to physical interaction characteristics measured during subsequent usage of the device to verify that a user is an authorized user.
    Type: Application
    Filed: March 9, 2012
    Publication date: September 12, 2013
    Applicant: DELL Products L.P.
    Inventors: Vadim Draluk, Francois Goldfain, Avery Audrey Kwan, Jan-Willem Maarse
  • Publication number: 20130198832
    Abstract: Mechanisms are provided to efficiently and effectively authenticate a user of a device. Passcode information such as passwords, pins, and access codes are obtained along with biometric information to periodically authenticate a user of a device. A user identity confidence score may be generated and continually modified by using data such as passcode information, biometric information, and/or user physical interaction characteristics information. If the user identify confidence score falls beneath a particular threshold, additional user authentication information may be requested.
    Type: Application
    Filed: January 31, 2012
    Publication date: August 1, 2013
    Applicant: DELL Products L.P.
    Inventors: Vadim Draluk, Francois Goldfain, Jan-Willem Maarse
  • Publication number: 20130160147
    Abstract: Mechanisms are provided to allow particular parties and applications access to protected application programming interfaces (APIs) without the use of security domains. Trusted parties and applications may have access to protected APIs while unfrosted parties and applications may be restricted to a more limited set of APIs. Public keys associated with individual applications that are used to enforce licensing policies can be repurposed for use in a verification process to prevent unauthorized access to APIs. A credential storage manager can be used to maintain permission and certificate information. An application authorization manager may access credential storage and maintain trusted application information.
    Type: Application
    Filed: December 16, 2011
    Publication date: June 20, 2013
    Applicant: DELL Products L.P.
    Inventors: Vadim Draluk, Francois Goldfain, Jan-Willem Maarse, Helen Bragg, Sean Xiao