Patents by Inventor James Lavine

James Lavine has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130065551
    Abstract: A uniform wireless network service selection information exchange interface system is provided to facilitate a consistent user experience across multiple wireless networks that may have different service plan activation or service plan purchase processes. Network detection of service usage anomalies based on device-based data usage reports is provided to enable the network to determine whether an end-user device is likely operating in accordance with the established policy, or whether the end-user device may be operating fraudulently.
    Type: Application
    Filed: September 9, 2011
    Publication date: March 14, 2013
    Inventors: Gregory G. Raleigh, Alireza Raissinia, James Lavine
  • Publication number: 20120324091
    Abstract: Device Assisted Services (DAS) for protecting network capacity is provided. In some embodiments, DAS for protecting network capacity includes monitoring a network service usage activity of the communications device in network communication; classifying the network service usage activity for differential network access control for protecting network capacity; and associating the network service usage activity with a network service usage control policy based on a classification of the network service usage activity to facilitate differential network access control for protecting network capacity.
    Type: Application
    Filed: May 25, 2011
    Publication date: December 20, 2012
    Inventors: Gregory G. Raleigh, Alireza Raissinia, James Lavine
  • Publication number: 20120221955
    Abstract: Network service provisioning is described. Network service provisioning to a device includes a mechanism for ensuring that network services are available based upon one or more of appropriate traffic control, billing, and notification policies. Ensuring that the policies are properly enforced on a device is a focus of this paper. The enforcement policies can be on the device or in the network.
    Type: Application
    Filed: December 1, 2011
    Publication date: August 30, 2012
    Inventors: Gregory G. Raleigh, Jeffrey Green, James Lavine
  • Publication number: 20120215911
    Abstract: A flow tagging technique includes tagging a data flow at a plurality of points in the data flow. For example, the data flow can be tagged at a socket and at a proxy manager API. By tagging the data flow at multiple points, it becomes possible to map network service usage activities to the appropriate initiating applications.
    Type: Application
    Filed: January 24, 2012
    Publication date: August 23, 2012
    Inventors: Gregory G. Raleigh, Jeffrey Green, James Lavine, Phuong D. Nguyen
  • Publication number: 20120167162
    Abstract: Secure architectures and methods for improving the security of mobile devices are disclosed. Also disclosed are apparatuses and methods to detect and mitigate fraud in device-assisted services implementations.
    Type: Application
    Filed: December 1, 2011
    Publication date: June 28, 2012
    Inventors: Gregory G. Raleigh, Jeffrey Green, James Lavine
  • Publication number: 20120101952
    Abstract: A process includes storing on an end user device (EUD) one or more notification actions corresponding to one or more notification requests, the EUD being associated with a service plan having a network service usage limit; performing a device action that reflects a past or intended use of the one or more network services; receiving by the EUD one of the one or more notification requests from a network element in response to the device action; performing by the EUD one of the one or more notification actions in response to the one of the one or more notification requests, the one of the one or more notification actions causing the EUD to retrieve a notification message portion associated with a status of the use, the portion being separate from the one of the one or more notification requests; and presenting the notification message on an EUD user interface.
    Type: Application
    Filed: October 4, 2011
    Publication date: April 26, 2012
    Inventors: Gregory G. Raleigh, Alireza Raissinia, James Lavine, Jeffrey Green
  • Publication number: 20120096513
    Abstract: Disclosed herein are various embodiments to prevent, detect, or take action in response to the moving a device credential from one device to another, the improper configuration of a service processor, a missing service processor, or the tampering with a service processor in device-assisted services (DAS) systems.
    Type: Application
    Filed: September 20, 2011
    Publication date: April 19, 2012
    Inventors: Gregory G. Raleigh, James Lavine
  • Publication number: 20120089727
    Abstract: A technique involves modular storage of network service plan components and provisioning of same. A subset of the capabilities of a service design system can be granted to a sandbox system to enable customization of service plan offerings or other controls.
    Type: Application
    Filed: September 28, 2011
    Publication date: April 12, 2012
    Inventors: Gregory G. Raleigh, Alireza Raissinia, James Lavine, Justin James
  • Publication number: 20120087319
    Abstract: Disclosed herein are various embodiments for publishing a service offer set to a device agent on an end-user device and for on-device selection of a service. In some embodiments, a network system publishes a service offer set to an end-user device over a wireless access network, receives an offer set user selection from the end-user device, and provisions one or more network functions based on the offer set user selection.
    Type: Application
    Filed: September 21, 2011
    Publication date: April 12, 2012
    Inventors: Gregory G. Raleigh, James Lavine, Alireza Raissinia
  • Publication number: 20120084438
    Abstract: Secure device data records (DDRs) are provided. In some embodiments, a system for secure DDRs includes a processor of a wireless communication device for wireless communication with a wireless network, in which the processor is configured with a secure execution environment, and in which the secure execution environment is configured to: monitor service usage of the wireless communication device with the wireless network; and generate a plurality of device data records of the monitored service usage of the wireless communication device with the wireless network, in which each device data record is associated with a unique sequence order identifier; and a memory coupled to the processor and configured to provide the processor with instructions. In some embodiments, the secure execution environment is located in an application processor, in a modem processor, and/or in a subscriber identity module (SIM).
    Type: Application
    Filed: September 28, 2011
    Publication date: April 5, 2012
    Inventors: Gregory G. Raleigh, Alireza Raissinia, Michael J. Sabin, James Lavine
  • Publication number: 20110314145
    Abstract: Device Assisted Services (DAS) for protecting network capacity is provided. In some embodiments, DAS for protecting network capacity includes monitoring a network service usage activity of the communications device in network communication; classifying the network service usage activity for differential network access control for protecting network capacity; and associating the network service usage activity with a network service usage control policy based on a classification of the network service usage activity to facilitate differential network access control for protecting network capacity.
    Type: Application
    Filed: May 25, 2011
    Publication date: December 22, 2011
    Inventors: Gregory G. Raleigh, Alireza Raissinia, James Lavine
  • Publication number: 20070300294
    Abstract: A wireless telephone and messaging system provides Secure Immediate Wireless Access (SIWA) to wireless telephones onto existing wireless networks, such as GSM, CDMA, TDMA, and analog (AMPS). The SIWA protocol uses existing wireless network messaging to exchange information between wireless devices and a network server, referred to herein as an Intelligent Service Manager (ISM). The ISM acts as a gateway between wireless devices and wireless service provider, and provides the wireless devices with an immediate limited or unlimited access to the wireless network. The ISM can also deny access to the wireless network from unauthorized wireless devices.
    Type: Application
    Filed: September 4, 2007
    Publication date: December 27, 2007
    Inventors: Eran Netanel, James Lavine
  • Publication number: 20060177955
    Abstract: An image sensor includes a semi-conducting substrate having a photo-sensitive region and doping for forming a path to a charge-to-voltage mechanism; a dielectric spanning the substrate; and a semi-conducting layer, which is less than approximately 1 micrometer, spanning the dielectric which contains electrodes and circuit elements that control flow of charge.
    Type: Application
    Filed: March 17, 2006
    Publication date: August 10, 2006
    Inventor: James Lavine
  • Publication number: 20060092296
    Abstract: A method for lowering dark current in an image sensor pixel, the method includes the steps of providing a photosensitive area for receiving incident light which is converted into a charge; providing a gate for transferring charge from the photosensitive area; wherein the gate is held at a voltage which will accumulate majority carriers at a semiconductor-dielectric interface during integration for the photosensitive area. Alternatively, a potentail profile can be provided under the gate to drain the dark current away from the photogeneration diffusion.
    Type: Application
    Filed: October 28, 2004
    Publication date: May 4, 2006
    Inventors: R. McGrath, Edward Nelson, Robert Guidash, Charles Stancampiano, James Lavine
  • Publication number: 20050151055
    Abstract: An image sensor includes a semi-conducting substrate having a photo-sensitive region and doping for forming a path to a charge-to-voltage mechanism; a dielectric spanning the substrate; and a semi-conducting layer, which is less than approximately 1 micrometer, spanning the dielectric which contains electrodes and circuit elements that control flow of charge.
    Type: Application
    Filed: January 8, 2004
    Publication date: July 14, 2005
    Inventor: James Lavine