Patents by Inventor James D. Keeler

James D. Keeler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130096906
    Abstract: In one or more embodiments, a system can emulate one or more physical mobile devices and can allow respective one or more users to utilize respective one or more emulations via a network. In one example, a first user, utilizing a first web browser, can interact with a first emulated mobile device. In another, a second user, utilizing a second web browser, can interact with a second emulated mobile device. In one or more embodiments, the first and second emulated mobile devices can respectively correspond to two different physical mobile devices, and the first and second users can concurrently interact with the first and second emulated mobile devices, respectively. In one or more embodiments, a user can upload a physical mobile device to an emulated mobile device, interact with the emulated device, and download changes made to the emulated mobile device to the physical mobile device.
    Type: Application
    Filed: March 23, 2012
    Publication date: April 18, 2013
    Applicant: INVODO, INC.
    Inventors: Arthur T. Niemeyer, Bruce A. Mayer, James D. Keeler, Mitchell D. Wilson, Dylan P. Spurgin, Matthew C. Brace
  • Publication number: 20120260320
    Abstract: A method includes receiving, at a client device, an authentication seed from a first network. The method also includes receiving a shared secret. The method further includes, in response to receiving the authentication seed, determining a network address of the client device. The method further includes computing a result of a one-way hash function of a combination of the network address, the authentication seed, and the shared secret. The method further includes transmitting the network address and the result of the one-way hash function to a server that provides access control of a second network coupled to the first network. The method further includes receiving permission from the server to access the second network.
    Type: Application
    Filed: June 18, 2012
    Publication date: October 11, 2012
    Applicant: Wayport, Inc.
    Inventors: James D. Keeler, John R. Melendez
  • Patent number: 8261327
    Abstract: With the proliferation of wireless devices, seamless authentication of devices at distributed locations (e.g., so-called Wi-Fi hotspots) may be essential for convenient use of various devices at these locations. Previous methods for authentication relied on an account-based method using a username and a password inputted from a user. This method may be awkward for mass-distribution of devices. Various embodiments disclosed may provide an authorization client that communicates with one or more servers that relies on client software and message authentication codes for authorization of network access.
    Type: Grant
    Filed: July 14, 2008
    Date of Patent: September 4, 2012
    Assignee: Wayport, Inc.
    Inventors: James D. Keeler, John R. Melendez
  • Patent number: 8196180
    Abstract: A system and method for providing roaming access on a network are disclosed. The network includes a plurality of wireless and/or wired access points. A user may access the network by using client software on a client computer (e.g., a portable computing device) to initiate an access procedure. In response, a network management device operated by a network provider may return an activation response message to the client. The client may send the user's username and password to the network provider. The network provider may rely on a roaming partner, another network provider with whom the user subscribes for internet access, for authentication of the user. Industry-standard methods such as RADIUS, CHAP, or EAP may be used for authentication. The providers may exchange pricing and service information and account information for the authentication session. A customer may select a pricing and service option from a list of available options.
    Type: Grant
    Filed: November 3, 2006
    Date of Patent: June 5, 2012
    Inventors: James D. Keeler, Matthew M. Krenzer
  • Patent number: 8108916
    Abstract: A system and method are disclosed for user fraud protection and prevention of access to a distributed network communication system. A first set of identification data associated with a first network access are stored. A second set of identification data associated with a second network access are stored. The first and second sets of identification data comprise a first computing device identification and a second computing device identification, respectively. If one or more fraud indicators are determined in the two sets of identification data, then the first and/or second network access may be revoked. The fraud indicators may include, e.g., use of the same username with different computing device identifications, use of the same computing device identification at different geographical locations, violation of a threshold for computing device identifications, violation of a threshold for authentication failures, and violation of a threshold for rate of network propagation by a user account.
    Type: Grant
    Filed: May 21, 2003
    Date of Patent: January 31, 2012
    Assignee: Wayport, Inc.
    Inventors: Ian M. Fink, James D. Keeler
  • Patent number: 8099321
    Abstract: A system and method uses a plurality of access points coupled to a network, wherein at least one of the plurality of access points is operable to communicate with a computing device, and a network provider server communicatively coupled to a network. The network provider server is operable to perform initiating communication between a computing device and a network, wherein the computing device is coupled to the network through an access point of the plurality of access points at a geographic location, determining different levels of services apply at the venue, presenting one or more of the different levels of services for selection by a user of the computing device, and delivering a level of service selected by the user, among the different levels of services, over the network to the computing device.
    Type: Grant
    Filed: December 10, 2007
    Date of Patent: January 17, 2012
    Assignee: Wayport, Inc.
    Inventors: James D. Keeler, Ian M. Fink, Matthew M. Krenzer
  • Patent number: 8090799
    Abstract: A method, system, and computer program product that enables persistent display of advertising and other service provider content during access via a gateway access system to third party content on a separate network. A connection is enabled between a personal computing device (PCD) and the gateway access system. The gateway access system facilitates retrieval of a first content from the network to be displayed within a first window on the PCD. The gateway access system provides program code to the PCD that when executed enables persistent display of a second window on the PCD that does not overlap with the first window. A second content is transmitted for display within the second window on the PCD, where the second content is displayed within the persistent window on the PCD along with the display of the first content.
    Type: Grant
    Filed: February 5, 2007
    Date of Patent: January 3, 2012
    Assignee: Wayport, Inc.
    Inventor: James D. Keeler
  • Patent number: 8040883
    Abstract: In various embodiments, one or more methods and/or systems described may provide probing and/or data replication capabilities for monitoring a user's computing device and the data the user's computing device transmits and/or receives to and/or from one or more networks. In some embodiments, an authorization signal may be intercepted, where the authorization signal may convey information about the user and/or the user's computing device, and a probe to replicate data to and/or from the user's computing device may be initiated. In various embodiments, the replicated data may be communicated to a mediation computing device, where one or more analyses may be performed.
    Type: Grant
    Filed: October 20, 2008
    Date of Patent: October 18, 2011
    Assignee: Wayport, Inc.
    Inventors: James D. Keeler, Mathew M. Krenzer, Tyler Eschenroeder, Todd L. Mathis
  • Patent number: 8005218
    Abstract: A system and method for providing roaming access on a network are disclosed. The network includes a plurality of wireless and/or wired access points. A user may access the network by using client software on a client computer (e.g., a portable computing device) to initiate an access procedure. In response, a network management device operated by a network provider may return an activation response message to the client. The client may send the user's username and password to the network provider. The network provider may rely on a roaming partner, another network provider with whom the user subscribes for internet access, for authentication of the user. Industry-standard methods such as RADIUS, CHAP, or EAP may be used for authentication. The providers may exchange pricing and service information and account information for the authentication session. A customer may select a pricing and service option from a list of available options.
    Type: Grant
    Filed: November 3, 2006
    Date of Patent: August 23, 2011
    Assignee: Wayport, Inc.
    Inventors: James D. Keeler, Matthew M. Krenzer
  • Patent number: 7958256
    Abstract: Internet protocol (IP) data service providers may provide several services over a single communications channel and/or circuit. For example, the provider may deliver public services such as Wi-Fi, content, gaming, etc. as well as business-critical “back-office” services such as credit card processing, VoIP, streaming video, video conferencing, etc. Some applications can very demanding from a quality of service standpoint, whereas other applications are unwanted or unauthorized on the network such as worms, viruses, denial of service attacks and/or certain types of peer-to-peer file sharing applications. Applications sharing the communication channel may be classified into one or more application classifications. The available bandwidth over the communications channel and/or circuit may then be managed via a prioritization system that can be parameterized based on the available bandwidth and/or the desired application behavior for given characterized applications.
    Type: Grant
    Filed: May 9, 2008
    Date of Patent: June 7, 2011
    Assignee: Wayport, Inc.
    Inventor: James D. Keeler
  • Patent number: 7856659
    Abstract: A system and method for providing network access are disclosed. After connecting to a network at an access point, a user of a computing device registers for network access with a network provider. In response to the registration, the network provider sends a completion page to the computing device. The completion page includes a link to an embedded file such as a small, transparent GIF image. When the computing device retrieves the embedded file, the embedded file is associated with a header than includes an instruction to generate a network system identifier (e.g., a cookie). The network system identifier may be stored by the computing device and later used to identify the computing device as a registrant for network access with the network provider. The embedded file may also be sent at other times, such as after authentication of the user for network access.
    Type: Grant
    Filed: March 11, 2003
    Date of Patent: December 21, 2010
    Assignee: Wayport, Inc.
    Inventors: James D. Keeler, Ian M. Fink, Matthew M. Krenzer
  • Publication number: 20090103539
    Abstract: In various embodiments, one or more methods and/or systems described may provide probing and/or data replication capabilities for monitoring a user's computing device and the data the user's computing device transmits and/or receives to and/or from one or more networks. In some embodiments, an authorization signal may be intercepted, where the authorization signal may convey information about the user and/or the user's computing device, and a probe to replicate data to and/or from the user's computing device may be initiated. In various embodiments, the replicated data may be communicated to a mediation computing device, where one or more analyses may be performed.
    Type: Application
    Filed: October 20, 2008
    Publication date: April 23, 2009
    Inventors: James D. Keeler, Matthew M. Krenzer, Tyler Eschenroeder, Todd L. Mathis
  • Publication number: 20090019530
    Abstract: With the proliferation of wireless devices, seamless authentication of devices at distributed locations (e.g., so-called Wi-Fi hotspots) may be essential for convenient use of various devices at these locations. Previous methods for authentication relied on an account-based method using a username and a password inputted from a user. This method may be awkward for mass-distribution of devices. Various embodiments disclosed may provide an authorization client that communicates with one or more servers that relies on client software and message authentication codes for authorization of network access.
    Type: Application
    Filed: July 14, 2008
    Publication date: January 15, 2009
    Inventors: James D. Keeler, John R. Melendez
  • Publication number: 20080287094
    Abstract: A system and method for providing roaming access on a network are disclosed. The network includes a plurality of wireless and/or wired access points. A user may access the network by using client software on a client computer (e.g., a portable computing device) to initiate an access procedure. In response, a network management device operated by a network provider may return an activation response message to the client. The client may send the user's username and password to the network provider. The network provider may rely on a roaming partner, another network provider with whom the user subscribes for internet access, for authentication of the user. Industry-standard methods such as RADIUS, CHAP, or EAP may be used for authentication. The providers may exchange pricing and service information and account information for the authentication session. A customer may select a pricing and service option from a list of available options.
    Type: Application
    Filed: November 3, 2006
    Publication date: November 20, 2008
    Inventors: James D. Keeler, Matthew M. Krenzer
  • Publication number: 20080281979
    Abstract: Internet protocol (IP) data service providers may provide several services over a single communications channel and/or circuit. For example, the provider may deliver public services such as Wi-Fi, content, gaming, etc. as well as business-critical “back-office” services such as credit card processing, VoIP, streaming video, video conferencing, etc. Some applications can very demanding from a quality of service standpoint, whereas other applications are unwanted or unauthorized on the network such as worms, viruses, denial of service attacks and/or certain types of peer-to-peer file sharing applications. Applications sharing the communication channel may be classified into one or more application classifications. The available bandwidth over the communications channel and/or circuit may then be managed via a prioritization system that can be parameterized based on the available bandwidth and/or the desired application behavior for given characterized applications.
    Type: Application
    Filed: May 9, 2008
    Publication date: November 13, 2008
    Inventor: James D. Keeler
  • Publication number: 20080065774
    Abstract: A method, system and computer program product for providing location-specific content to a personal computing device (PCD) connected to a distributed server network (such as the Internet) without requiring an access control gateway to provide such content. Location-specific (and user-specific) content/services are provided by a client-server architecture utilizing a location database and a location look-up utility of a location identifier and content retrieval (LICR) server. Specifically, a utility executing on the PCD provides PCD location parameters to the LICR server, which is equipped with a location look up engine/functionality and a location content retrieval engine/functionality (both within a LICR utility) that responds by providing location-specific and user-specific content to the PCD.
    Type: Application
    Filed: September 12, 2007
    Publication date: March 13, 2008
    Applicant: Wayport, Inc.
    Inventor: James D. Keeler
  • Patent number: 6879971
    Abstract: A method for determining an output value having a known relationship to an input value with a predicted value includes the step of first training a predictive model with at least one output for a given set of inputs that exist in a finite dataset. Data is then input to the predictive model that is within the set of given inputs. Thereafter, a prediction is made of an output from the predictive model that corresponds to the given input such that a predicted output value will be obtained which will have associated therewith the errors of the predictive model.
    Type: Grant
    Filed: June 5, 2001
    Date of Patent: April 12, 2005
    Assignee: Pavilion Technologies, Inc.
    Inventors: James D. Keeler, Eric J. Hartman, Devendra B. Godbole, Steve Piche, Laura Arbila, Joshua Ellinger, R. Bruce Ferguson, II, John Krauskop, Jill L. Kempf, Steven A. O'Hara, Audrey Strauss, Jitendra W. Telang
  • Publication number: 20040236702
    Abstract: A system and method are disclosed for user fraud protection and prevention of access to a distributed network communication system. A first set of identification data associated with a first network access are stored. A second set of identification data associated with a second network access are stored. The first and second sets of identification data comprise a first computing device identification and a second computing device identification, respectively. If one or more fraud indicators are determined in the two sets of identification data, then the first and/or second network access may be revoked. The fraud indicators may include, e.g., use of the same username with different computing device identifications, use of the same computing device identification at different geographical locations, violation of a threshold for computing device identifications, violation of a threshold for authentication failures, and violation of a threshold for rate of network propagation by a user account.
    Type: Application
    Filed: May 21, 2003
    Publication date: November 25, 2004
    Inventors: Ian M. Fink, James D. Keeler
  • Publication number: 20030233580
    Abstract: A system and method for providing roaming access on a network are disclosed. The network includes a plurality of wireless and/or wired access points. A user may access the network by using client software on a client computer (e.g., a portable computing device) to initiate an access procedure. In response, a network management device operated by a network provider may return an activation response message to the client. The client may send the user's username and password to the network provider. The network provider may rely on a roaming partner, another network provider with whom the user subscribes for internet access, for authentication of the user. Industry-standard methods such as RADIUS, CHAP, or EAP may be used for authentication. The providers may exchange pricing and service information and account information for the authentication session. A customer may select a pricing and service option from a list of available options.
    Type: Application
    Filed: January 14, 2003
    Publication date: December 18, 2003
    Inventors: James D. Keeler, Matthew M. Krenzer
  • Publication number: 20030233332
    Abstract: A system and method for providing network access are disclosed. After connecting to a network at an access point, a user of a computing device registers for network access with a network provider. In response to the registration, the network provider sends a completion page to the computing device. The completion page includes a link to an embedded file such as a small, transparent GIF image. When the computing device retrieves the embedded file, the embedded file is associated with a header than includes an instruction to generate a network system identifier (e.g., a cookie). The network system identifier may be stored by the computing device and later used to identify the computing device as a registrant for network access with the network provider. The embedded file may also be sent at other times, such as after authentication of the user for network access.
    Type: Application
    Filed: March 11, 2003
    Publication date: December 18, 2003
    Inventors: James D. Keeler, Ian M. Fink, Matthew M. Krenzer