Patents by Inventor Hadi Nahari

Hadi Nahari has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110076942
    Abstract: Methods and systems utilize a shake and transfer process to initiate a wireless communication provide a user device with time and location information of the communication, which can be associated with contact information of a user of the other device. As a result, a user has additional information associated with a contact, and the time and location information can be used to determine or track elapsed time and distance traveled between communications.
    Type: Application
    Filed: September 30, 2009
    Publication date: March 31, 2011
    Applicant: eBay Inc.
    Inventors: Sebastien Taveau, Carl Stone, Nadav Naaman, Hadi Nahari
  • Publication number: 20110076941
    Abstract: Methods and systems utilize a shake and transfer process to provide a consumer with an enhanced user experience. In a first embodiment, a purchase is made between two devices using NFC, and a shake and transfer process downloads large data, such as a movie, video, or game, from one device to the other. In a second embodiment, the user can select information or data, such as non-user contacts, photos, or videos, on the phone to transfer during a shake and transfer process. In yet another embodiment, a user may pay for purchases from an unattended merchant, such as a vending machine, using a shake and transfer process, where the user may also receive incentives, based on the user profile and/or purchase, from the unattended merchant.
    Type: Application
    Filed: September 30, 2009
    Publication date: March 31, 2011
    Applicant: eBay Inc.
    Inventors: Sebastien Taveau, Carl Stone, Nadav Naaman, Hadi Nahari
  • Publication number: 20100306819
    Abstract: Systems and methods for use with a client device and a server provide interactive phishing detection at the initiation of the user. Detection of phishing is based on the user's comparison of a visual indicator sent from the server to the client device with a another identical looking visual indicator displayed, for example, on a trusted website. Several security measures may be employed such as changing the visual indicator periodically, generating the visual indicator in a random manner, and authenticating the client device to the server before the server will transmit the visual indicator to the client device. User comparison of the website-displayed visual indicator with the user's client device user interface-displayed visual indicator may facilitate user verification of authenticity of a software application.
    Type: Application
    Filed: April 1, 2010
    Publication date: December 2, 2010
    Applicant: eBay Inc.
    Inventors: Hadi Nahari, Aleksey V. Sanin
  • Publication number: 20100303230
    Abstract: A system includes a tag having a machine readable tag identifier (Tag ID) configured to be read by a reader; and a device to be identified by the tag, in which: the device is configured to communicate with the reader; the device has access to a secure Tag ID; and the device communicates a verification to the reader if the machine readable Tag ID communicated to the device from the reader matches the secure Tag ID. A method includes: reading a Tag ID from a tag attached to a device; communicating the Tag ID read from the tag to the device; comparing a secure Tag ID of the device to the Tag ID read from the tag; and responding with a “match” or “no-match” message from the device, according to which the device is either trusted or not trusted as being identified by the Tag ID. A method of verifying a trusted agent (TA) on a device includes: storing a digital signature of the TA in a secure vault of the device; and verifying the TA by verifying the digital signature of the TA each time the TA is used.
    Type: Application
    Filed: March 5, 2010
    Publication date: December 2, 2010
    Applicant: EBAY INC.
    Inventors: Sebastien Taveau, Hadi Nahari
  • Publication number: 20100306107
    Abstract: Systems and methods for use with a service provider and a consumer electronic device include a trusted remote attestation agent (TRAA) configured to perform a set of checking procedures or mechanisms to help ensure the security status of a consumer electronic device (e.g., a mobile terminal or phone) that holds financial instruments. The checking procedures may include: self-verifying integrity by the TRAA; checking for presence of a provisioning SIM card (one that was present when the financial instruments were enabled on the device); checking that a communication connection between the consumer electronic device and the service provider is available and active; and checking that communication connectivity to a home mobile network is available and active. The frequency of the checking mechanisms may be adjusted, for example, according to a risk-profile of a user associated with the device or the location (e.g., GPS location) of the device.
    Type: Application
    Filed: March 31, 2010
    Publication date: December 2, 2010
    Applicant: eBay Inc.
    Inventor: Hadi Nahari
  • Publication number: 20100306076
    Abstract: A system for use with a trusted service manager (TSM) and a mobile device having a subscriber unique identifying data, according to one embodiment, includes: a server in which the server validates an application against the unique and identifying data of the mobile device and provides the validated application for the mobile device; and a secure element (SE) acting as a client in which the SE is present in the mobile device as client; the validated application from the server is installed in the SE; and the SE is adapted to execute the validated application to perform a service process.
    Type: Application
    Filed: December 21, 2009
    Publication date: December 2, 2010
    Applicant: EBAY INC.
    Inventors: Sebastien Taveau, Hadi Nahari, Eric Duprat
  • Publication number: 20100306531
    Abstract: Systems and methods are provided for a device to engage in a zero-knowledge proof with an entity requiring authentication either of secret material or of the device itself. The device may provide protection of the secret material or its private key for device authentication using a hardware security module (HSM) of the device, which may include, for example, a read-only memory (ROM) accessible or programmable only by the device manufacturer. In the case of authenticating the device itself a zero-knowledge proof of knowledge may be used. The zero-knowledge proof or zero-knowledge proof of knowledge may be conducted via a communication channel on which an end-to-end (e.g.
    Type: Application
    Filed: March 25, 2010
    Publication date: December 2, 2010
    Applicant: EBAY INC.
    Inventor: Hadi Nahari
  • Publication number: 20100150352
    Abstract: A system, according to one embodiment, includes a master key for encryption of data; an encryption key site accessible by computer and storing a first piece of the master key; a configuration file resident in a computer file system, the configuration file storing a second piece of the master key; a computer database storing a third piece of the master key; a master-key seal key used to encrypt the master key, wherein a secure self managed data (SSMD) key is obtained by assembling and decrypting the first piece, the second piece and the third piece using the master-key seal key; a unique ID for the data; a classification level for the data; and an expiration time for the data, wherein the data, the unique ID, the classification level, and the expiration time are encrypted together using the SSMD key to form an SSMD encoded data.
    Type: Application
    Filed: March 31, 2009
    Publication date: June 17, 2010
    Inventors: Rasta A. Mansour, Hadi Nahari