Patents by Inventor Harold Teramoto

Harold Teramoto has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11711214
    Abstract: Methods and systems for token transfer are described herein. A remote computing device may receive, from a mobile computing device, a public key of a public-private key pair. The public key may be associated with a first application of the mobile computing device. The first application may be configured to send credentials to a second application of the mobile computing device. The second application may be isolated from other applications executable on the mobile computing device. The remote computing device may receive, from the first application, a token. The token may have been previously issued to the first application and may have been encrypted, using the public key, by the first application. The remote computing device may send, to the second application, the token to enable the second application to authenticate with a plurality of services that interact with the second application.
    Type: Grant
    Filed: July 12, 2022
    Date of Patent: July 25, 2023
    Inventors: Thierry Duchastel, Harold Teramoto, Vikas Nambiar, Ashish Gujarathi
  • Publication number: 20220345310
    Abstract: Methods and systems for token transfer are described herein. A remote computing device may receive, from a mobile computing device, a public key of a public-private key pair. The public key may be associated with a first application of the mobile computing device. The first application may be configured to send credentials to a second application of the mobile computing device. The second application may be isolated from other applications executable on the mobile computing device. The remote computing device may receive, from the first application, a token. The token may have been previously issued to the first application and may have been encrypted, using the public key, by the first application. The remote computing device may send, to the second application, the token to enable the second application to authenticate with a plurality of services that interact with the second application.
    Type: Application
    Filed: July 12, 2022
    Publication date: October 27, 2022
    Inventors: Thierry Duchastel, Harold Teramoto, Vikas Nambiar, Ashish Gujarathi
  • Patent number: 11431502
    Abstract: Methods and systems for token transfer are described herein. A remote computing device may receive, from a mobile computing device, a public key of a public-private key pair. The public key may be associated with a first application of the mobile computing device. The first application may be configured to send credentials to a second application of the mobile computing device. The second application may be isolated from other applications executable on the mobile computing device. The remote computing device may receive, from the first application, a token. The token may have been previously issued to the first application and may have been encrypted, using the public key, by the first application. The remote computing device may send, to the second application, the token to enable the second application to authenticate with a plurality of services that interact with the second application.
    Type: Grant
    Filed: September 18, 2020
    Date of Patent: August 30, 2022
    Assignee: Citrix Systems, Inc.
    Inventors: Thierry Duchastel, Harold Teramoto, Vikas Nambiar, Ashish Gujarathi
  • Publication number: 20220094547
    Abstract: Methods and systems for token transfer are described herein. A remote computing device may receive, from a mobile computing device, a public key of a public-private key pair. The public key may be associated with a first application of the mobile computing device. The first application may be configured to send credentials to a second application of the mobile computing device. The second application may be isolated from other applications executable on the mobile computing device. The remote computing device may receive, from the first application, a token. The token may have been previously issued to the first application and may have been encrypted, using the public key, by the first application. The remote computing device may send, to the second application, the token to enable the second application to authenticate with a plurality of services that interact with the second application.
    Type: Application
    Filed: September 18, 2020
    Publication date: March 24, 2022
    Inventors: Thierry Duchastel, Harold Teramoto, Vikas Nambiar, Ashish Gujarathi
  • Publication number: 20220038282
    Abstract: Methods and systems for providing a token to a protected portion of a computing device are described herein. A computing device may comprise a first portion and a second portion, and the second portion may be prevented by a security policy from interacting with the first portion. A server may receive, from a first application executing on a first portion of the computing device, a token. The server may generate a key based on the token. The server may send the key to a second portion of the computing device. The second portion of the computing device may send a request for the token, and the request may comprise the key. The server may send the token to the second portion of the computing device. The token may be encrypted such that the unencrypted token is not available to the server.
    Type: Application
    Filed: July 28, 2020
    Publication date: February 3, 2022
    Inventors: Harold Teramoto, Ashish Gujarathi, Vikas Nambiar
  • Publication number: 20190236249
    Abstract: Systems and methods for authenticating a user through behavioral analysis. The methods comprise: collecting observation data specifying an observed behavior of the user while interacting with a computing device; obtaining a confidence value reflecting a degree of confidence that the user is an authorized or unauthorized user of the computing device (where the confidence value is determined based on the observation data and a machine learning model trained with a known behavior pattern of the authorized user); using at least the confidence value and the observed behavior's amount of deviation from a normal behavior pattern to derive a risk level score value for a user account to which the computing device is associated; comparing the risk level score value to a threshold value; and performing at least one action to protect user account security when the threshold value is equal to or greater than the threshold value.
    Type: Application
    Filed: January 31, 2018
    Publication date: August 1, 2019
    Inventors: Chris Pavlou, Georgios Oikonomou, Harold Teramoto