Patents by Inventor Jacqueline Mak

Jacqueline Mak has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10993113
    Abstract: One or more beaconing devices transmit synchronized changing beacons. The changing beacons trigger execution of an application that is installed but closed or not running on a mobile device, that is in wireless beaconing range of a beaconing device, and that has registered the changing beacons with the mobile device operating system (“OS”) to trigger execution of the application upon receipt of the changing beacons. The changing beacons also keep the executing application running by resetting OS policies for closing the application when it is running with the mobile device in a locked or standby state. The application may perform different procedures and different times with the beaconing device or other devices including authorizing access to a secured resource when the mobile device is far away from the beaconing device, and confirming intent to access the secured resource when the mobile device is close to the beaconing device.
    Type: Grant
    Filed: December 12, 2018
    Date of Patent: April 27, 2021
    Assignee: OpenPath Security Inc.
    Inventors: Samy Kamkar, Cameron Kaye, Jacqueline Mak
  • Publication number: 20200059788
    Abstract: One or more beaconing devices transmit synchronized changing beacons. The changing beacons trigger execution of an application that is installed but closed or not running on a mobile device, that is in wireless beaconing range of a beaconing device, and that has registered the changing beacons with the mobile device operating system (“OS”) to trigger execution of the application upon receipt of the changing beacons. The changing beacons also keep the executing application running by resetting OS policies for closing the application when it is running with the mobile device in a locked or standby state. The application may perform different procedures and different times with the beaconing device or other devices including authorizing access to a secured resource when the mobile device is far away from the beaconing device, and confirming intent to access the secured resource when the mobile device is close to the beaconing device.
    Type: Application
    Filed: December 12, 2018
    Publication date: February 20, 2020
    Applicant: OpenPath Security Inc.
    Inventors: Samy Kamkar, Cameron Kaye, Jacqueline Mak
  • Patent number: 10445956
    Abstract: Secure handsfree two-stage access control is provided via a first stage that is performed when a mobile device is within a first distance from an access control reader, and a second stage that is performed when the mobile device is within a second distance from the reader, wherein the second distance is less than the first distance. Performing the first stage includes establishing a secure connection between the mobile device and the reader, and authorizing access for the mobile device to a secured resource. Performing the second stage includes providing access to the secured resource when the mobile device has been authorized to access the secured resource during the first stage, and the mobile device enters within the second distance from the reader. The second stage may be triggered in response to the reader detecting a user gesture or action.
    Type: Grant
    Filed: August 20, 2018
    Date of Patent: October 15, 2019
    Assignee: OPENPATH SECURITY INC.
    Inventors: Samy Kamkar, Jacqueline Mak, Cameron Kaye, Michael Biggs
  • Patent number: 10257708
    Abstract: One or more beaconing devices transmit synchronized changing beacons. The changing beacons trigger execution of an application that is installed but closed or not running on a mobile device, that is in wireless beaconing range of a beaconing device, and that has registered the changing beacons with the mobile device operating system (“OS”) to trigger execution of the application upon receipt of the changing beacons. The changing beacons also keep the executing application running by resetting OS policies for closing the application when it is running with the mobile device in a locked or standby state. The application may perform different procedures and different times with the beaconing device or other devices including authorizing access to a secured resource when the mobile device is far away from the beaconing device, and confirming intent to access the secured resource when the mobile device is close to the beaconing device.
    Type: Grant
    Filed: August 20, 2018
    Date of Patent: April 9, 2019
    Assignee: OPENPATH SECURITY INC.
    Inventors: Samy Kamkar, Cameron Kaye, Jacqueline Mak
  • Publication number: 20190073846
    Abstract: Secure handsfree two-stage access control is provided via a first stage that is performed when a mobile device is within a first distance from an access control reader, and a second stage that is performed when the mobile device is within a second distance from the reader, wherein the second distance is less than the first distance. Performing the first stage includes establishing a secure connection between the mobile device and the reader, and authorizing access for the mobile device to a secured resource. Performing the second stage includes providing access to the secured resource when the mobile device has been authorized to access the secured resource during the first stage, and the mobile device enters within the second distance from the reader. The second stage may be triggered in response to the reader detecting a user gesture or action.
    Type: Application
    Filed: August 20, 2018
    Publication date: March 7, 2019
    Applicant: OpenPath Security Inc.
    Inventors: Samy Kamkar, Jacqueline Mak, Cameron Kaye, Michael Biggs
  • Patent number: 9191363
    Abstract: Some embodiments provide firewalls and methods for guarding against attacks by leveraging the Document Object Model (DOM). The firewall renders the DOM tree to produce a white-list rendering of the data which presents the non-executable elements of the data and, potentially, outputs of the executable elements of the data without the executable elements that could be used to carry a security threat. Some embodiments provide control over which nodes of the DOM tree are included in producing the white-list rendering. Specifically, a configuration file is specified to white-list various nodes from the DOM tree and the white-list rendering is produced by including the DOM tree nodes that are specified in the white-list of the configuration file while excluding those nodes that are not in the white-list. Some embodiments provide a hybrid firewall that executes a set of black-list rules over white-listed nodes of the DOM tree.
    Type: Grant
    Filed: November 15, 2013
    Date of Patent: November 17, 2015
    Assignee: EDGECAST NETWORKS, INC.
    Inventors: Jayson G. Sakata, Jacqueline Mak, Alexander A. Kazerani
  • Publication number: 20140380454
    Abstract: Some embodiments provide firewalls and methods for guarding against attacks by leveraging the Document Object Model (DOM). The firewall renders the DOM tree to produce a white-list rendering of the data which presents the non-executable elements of the data and, potentially, outputs of the executable elements of the data without the executable elements that could be used to carry a security threat. Some embodiments provide control over which nodes of the DOM tree are included in producing the white-list rendering. Specifically, a configuration file is specified to white-list various nodes from the DOM tree and the white-list rendering is produced by including the DOM tree nodes that are specified in the white-list of the configuration file while excluding those nodes that are not in the white-list. Some embodiments provide a hybrid firewall that executes a set of black-list rules over white-listed nodes of the DOM tree.
    Type: Application
    Filed: November 15, 2013
    Publication date: December 25, 2014
    Applicant: Edgecast Networks, Inc.
    Inventors: Jayson G. Sakata, Jacqueline Mak, Alexander A. Kazerani
  • Patent number: 8601565
    Abstract: Some embodiments provide firewalls and methods for guarding against attacks by leveraging the Document Object Model (DOM). The firewall renders the DOM tree to produce a white-list rendering of the data which presents the non-executable elements of the data and, potentially, outputs of the executable elements of the data without the executable elements that could be used to carry a security threat. Some embodiments provide control over which nodes of the DOM tree are included in producing the white-list rendering. Specifically, a configuration file is specified to white-list various nodes from the DOM tree and the white-list rendering is produced by including the DOM tree nodes that are specified in the white-list of the configuration file while excluding those nodes that are not in the white-list. Some embodiments provide a hybrid firewall that executes a set of black-list rules over white-listed nodes of the DOM tree.
    Type: Grant
    Filed: July 10, 2013
    Date of Patent: December 3, 2013
    Assignee: Edgecast Networks, Inc.
    Inventors: Jayson G. Sakata, Jacqueline Mak, Alexander A. Kazerani