Patents by Inventor Jay Logue

Jay Logue has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10015825
    Abstract: A method for using a first device to pair a second device to a user account may include receiving first wireless communications using a first wireless protocol, where the first device has previously been paired with the user account. The method may also include receiving a transmission that instructs the first device to establish second wireless communications with the second device, and then establishing the second wireless communications between the first device and the second device using a second wireless protocol. The method may additionally include receiving, using the first wireless protocol, information allowing the second device to use the first wireless protocol, and sending the information to the second device using the second wireless protocol, where a new pairing between the second device and the user account is established using the first wireless protocol.
    Type: Grant
    Filed: March 14, 2017
    Date of Patent: July 3, 2018
    Assignee: Google LLC
    Inventors: Jay Logue, Grant Erickson, Roger Tinkoff, David Sloo, Anthony M. Fadell, Matthew L. Rogers, Jeffrey A. Boyd, James B. Simister
  • Patent number: 9820315
    Abstract: A method for establishing a pairing between a smart-home device and an online account may include instantiating an application on a computing device and receiving a first code from a central server. The application may receive a second code from printed material associated with the smart-home device. The smart-home device may broadcast a first communication protocol, and the application may join the first mutation protocol. The application can be authenticated by the smart-home device using the second code, and the application can receive an identity of a second communication protocol from a user. The application can then transmit the identity of the second communication protocol to the smart-home device. The smart-home device can use the second mutation protocol to access the Internet and transmit the first code to the central server, where the central server can use the first code in completing the pairing process.
    Type: Grant
    Filed: May 22, 2015
    Date of Patent: November 14, 2017
    Assignee: Google Inc.
    Inventors: Sophie Le Guen, David Sloo, Anthony M. Fadell, Matthew L. Rogers, Shigefumi Honjo, Jay Logue, Grant Erickson, Nicholas Webb, Jeffrey A. Boyd, James B. Simister, Jesse W. Boettcher, Timo A. Bruck, Kevin Coppock, Shiney Rossi
  • Publication number: 20170202039
    Abstract: A method for using a first device to pair a second device to a user account may include receiving first wireless communications using a first wireless protocol, where the first device has previously been paired with the user account. The method may also include receiving a transmission that instructs the first device to establish second wireless communications with the second device, and then establishing the second wireless communications between the first device and the second device using a second wireless protocol. The method may additionally include receiving, using the first wireless protocol, information allowing the second device to use the first wireless protocol, and sending the information to the second device using the second wireless protocol, where a new pairing between the second device and the user account is established using the first wireless protocol.
    Type: Application
    Filed: March 14, 2017
    Publication date: July 13, 2017
    Applicant: Google Inc.
    Inventors: Jay Logue, Grant Erickson, Roger Tinkoff, David Sloo, Anthony M. Fadell, Matthew L. Rogers, Jeffrey A. Boyd, James B. Simister
  • Patent number: 9596708
    Abstract: include using an application on a mobile device to establish first wireless communications with a first smart-home device that was previously paired with the user account. The method may also include transmitting, to the first smart-home device and using the first wireless protocol, a transmission that instructs the first smart-home device to establish second wireless communications with a second smart-home device, where the second wireless communications use a second wireless protocol. The method may additionally include transmitting network credentials to the first smart-home device using the first wireless protocol, where the credentials are then sent from the first smart-home device to the second smart-home device using the second wireless protocol, such that the second smart-home device can pair with the user account using the first wireless protocol.
    Type: Grant
    Filed: April 8, 2016
    Date of Patent: March 14, 2017
    Assignee: Google Inc.
    Inventors: Jay Logue, Grant Erickson, Roger Tinkoff, David Sloo, Anthony M. Fadell, Matthew L. Rogers, Jeffrey A. Boyd, James B. Simister
  • Publication number: 20160249395
    Abstract: include using an application on a mobile device to establish first wireless communications with a first smart-home device that was previously paired with the user account. The method may also include transmitting, to the first smart-home device and using the first wireless protocol, a transmission that instructs the first smart-home device to establish second wireless communications with a second smart-home device, where the second wireless communications use a second wireless protocol. The method may additionally include transmitting network credentials to the first smart-home device using the first wireless protocol, where the credentials are then sent from the first smart-home device to the second smart-home device using the second wireless protocol, such that the second smart-home device can pair with the user account using the first wireless protocol.
    Type: Application
    Filed: April 8, 2016
    Publication date: August 25, 2016
    Applicant: Google Inc.
    Inventors: Jay Logue, Grant Erickson, Roger Tinkoff, David Sloo, Anthony M. Fadell, Matthew L. Rogers, Jeffrey A. Boyd, James B. Simister
  • Patent number: 9332040
    Abstract: include using an application on a mobile device to establish first wireless communications with a first hazard detector that was previously paired with the user account. The method may also include transmitting, to the first hazard detector and using the first wireless protocol, a transmission that instructs the first hazard detector to establish second wireless communications with a second hazard detector, where the second wireless communications use a second wireless protocol. The method may additionally include transmitting network credentials to the first hazard detector using the first wireless protocol, where the credentials are then sent from the first hazard detector to the second hazard detector using the second wireless protocol, such that the second hazard detector can pair with the user account using the first wireless protocol.
    Type: Grant
    Filed: October 7, 2014
    Date of Patent: May 3, 2016
    Assignee: Google Inc.
    Inventors: Jay Logue, Grant Erickson, Roger Tinkoff, David Sloo, Anthony M. Fadell, Matthew L. Rogers, Jeffrey A. Boyd, James B. Simister
  • Publication number: 20150256563
    Abstract: A method for establishing a pairing between a smart-home device and an online account may include instantiating an application on a computing device and receiving a first code from a central server. The application may receive a second code from printed material associated with the smart-home device. The smart-home device may broadcast a first communication protocol, and the application may join the first mutation protocol. The application can be authenticated by the smart-home device using the second code, and the application can receive an identity of a second communication protocol from a user. The application can then transmit the identity of the second communication protocol to the smart-home device. The smart-home device can use the second mutation protocol to access the Internet and transmit the first code to the central server, where the central server can use the first code in completing the pairing process.
    Type: Application
    Filed: May 22, 2015
    Publication date: September 10, 2015
    Applicant: GOOGLE INC.
    Inventors: Sophie Le Guen, David Sloo, Anthony M. Fadell, Matthew L. Rogers, Shigefumi Honjo, Jay Logue, Grant Erickson, Nicholas Webb, Jeffrey A. Boyd, James B. Simister, Jesse W. Boettcher, Timo A. Bruck, Kevin Coppock, Shiney Rossi
  • Patent number: 9049567
    Abstract: A method for establishing a pairing between a hazard detector and an online account may include instantiating an application on a mobile computing device and receiving a first code from a central server. The application may receive a second code from printed material associated with the hazard detector. The hazard detector may broadcast a Wi-Fi access point, and the application may join the Wi-Fi access point. The application can be authenticated by the hazard detector using the second code, and the application can receive an identity of a home Wi-Fi network from a user. The application can then transmit the identity of the home Wi-Fi network to the hazard detector. The hazard detector can use the home Wi-Fi network to access the Internet and transmit the first code to the central server, where the central server can use the first code in completing the pairing process.
    Type: Grant
    Filed: October 7, 2014
    Date of Patent: June 2, 2015
    Assignee: Google Inc.
    Inventors: Sophie Le Guen, David Sloo, Anthony M. Fadell, Matthew L. Rogers, Shigefumi Honjo, Jay Logue, Grant Erickson, Nick Webb, Jeffrey A. Boyd, James B. Simister, Jesse W. Boettcher, Timo A. Bruck, Kevin Coppock, Shiney Rossi
  • Patent number: 9037660
    Abstract: A recipient computer system may receive one or more electronic messages. The recipient computer system may send one, two, or more challenge messages to the sender of the electronic messages in determining whether to deliver the electronic message. The recipient computer system may accept or reject an electronic message based on the response, or lack of response, to the challenge messages. The recipient computer system may send two or more challenge messages at intervals. A sender computer system may record activity of the sender computer system for a recipient computer system to use in determining whether to deliver an electronic message. A sender computer system may provide a summary of that activity with an electronic message. A sender computer system may provide an authorization key for a recipient computer system to use in determining whether to deliver an electronic message. The authorization key may be generated by a third party.
    Type: Grant
    Filed: December 5, 2011
    Date of Patent: May 19, 2015
    Assignee: GOOGLE INC.
    Inventors: Richard A. Landsman, Jay Logue, Jeffrey N. Heiner, John S. Evans, Michael R. Migliore, Susan Rayl Goldman
  • Publication number: 20150100618
    Abstract: A method for establishing a pairing between a hazard detector and an online account may include instantiating an application on a mobile computing device and receiving a first code from a central server. The application may receive a second code from printed material associated with the hazard detector. The hazard detector may broadcast a Wi-Fi access point, and the application may join the Wi-Fi access point. The application can be authenticated by the hazard detector using the second code, and the application can receive an identity of a home Wi-Fi network from a user. The application can then transmit the identity of the home Wi-Fi network to the hazard detector. The hazard detector can use the home Wi-Fi network to access the Internet and transmit the first code to the central server, where the central server can use the first code in completing the pairing process.
    Type: Application
    Filed: October 7, 2014
    Publication date: April 9, 2015
    Applicant: Google Inc.
    Inventors: Sophie Le Guen, David Sloo, Anthony M. Fadell, Matthew L. Rogers, Shigefumi Honjo, Jay Logue, Grant Erickson, Nick Webb, Jeffrey A. Boyd, James B. Simister, Jesse W. Boettcher, Timo A. Bruck, Kevin Coppock, Shiney Rossi
  • Publication number: 20150097689
    Abstract: include using an application on a mobile device to establish first wireless communications with a first hazard detector that was previously paired with the user account. The method may also include transmitting, to the first hazard detector and using the first wireless protocol, a transmission that instructs the first hazard detector to establish second wireless communications with a second hazard detector, where the second wireless communications use a second wireless protocol. The method may additionally include transmitting network credentials to the first hazard detector using the first wireless protocol, where the credentials are then sent from the first hazard detector to the second hazard detector using the second wireless protocol, such that the second hazard detector can pair with the user account using the first wireless protocol.
    Type: Application
    Filed: October 7, 2014
    Publication date: April 9, 2015
    Applicant: Google Inc.
    Inventors: Jay Logue, Grant Erickson, Roger Tinkoff, David Sloo, Anthony M. Fadell, Matthew L. Rogers, Jeffrey A. Boyd, James B. Simister
  • Publication number: 20120079050
    Abstract: A recipient computer system may receive one or more electronic messages. The recipient computer system may send one, two, or more challenge messages to the sender of the electronic messages in determining whether to deliver the electronic message. The recipient computer system may accept or reject an electronic message based on the response, or lack of response, to the challenge messages. The recipient computer system may send two or more challenge messages at intervals. A sender computer system may record activity of the sender computer system for a recipient computer system to use in determining whether to deliver an electronic message. A sender computer system may provide a summary of that activity with an electronic message. A sender computer system may provide an authorization key for a recipient computer system to use in determining whether to deliver an electronic message. The authorization key may be generated by a third party.
    Type: Application
    Filed: December 5, 2011
    Publication date: March 29, 2012
    Inventors: Phillip York Goldman, Susan Rayl Goldman, Richard A. Landsman, Jay Logue, Jeffrey N. Heiner, John S. Evans, Michael R. Migliore
  • Patent number: 8073916
    Abstract: A recipient computer system may receive one or more electronic messages. The recipient computer system may send one, two, or more challenge messages to the sender of the electronic messages in determining whether to deliver the electronic message. The recipient computer system may accept or reject an electronic message based on the response, or lack of response, to the challenge messages. The recipient computer system may send two or more challenge messages at intervals. A sender computer system may record activity of the sender computer system for a recipient computer system to use in determining whether to deliver an electronic message. A sender computer system may provide a summary of that activity with an electronic message. A sender computer system may provide an authorization key for a recipient computer system to use in determining whether to deliver an electronic message. The authorization key may be generated by a third party.
    Type: Grant
    Filed: August 6, 2009
    Date of Patent: December 6, 2011
    Assignee: AOL Inc.
    Inventors: Richard A. Landsman, Jay Logue, Jeffrey N. Heiner, John S. Evans, Michael R. Migliore
  • Publication number: 20090307326
    Abstract: A recipient computer system may receive one or more electronic messages. The recipient computer system may send one, two, or more challenge messages to the sender of the electronic messages in determining whether to deliver the electronic message. The recipient computer system may accept or reject an electronic message based on the response, or lack of response, to the challenge messages. The recipient computer system may send two or more challenge messages at intervals. A sender computer system may record activity of the sender computer system for a recipient computer system to use in determining whether to deliver an electronic message. A sender computer system may provide a summary of that activity with an electronic message. A sender computer system may provide an authorization key for a recipient computer system to use in determining whether to deliver an electronic message. The authorization key may be generated by a third party.
    Type: Application
    Filed: August 6, 2009
    Publication date: December 10, 2009
    Applicant: AOL LLC
    Inventors: Richard A. Landsman, Jay Logue, Jeffrey N. Heiner, John S. Evans, Michael R. Migliore
  • Patent number: 7627635
    Abstract: A system may include an electronic messaging system that may access user identifier information, which may be used to identify self-addressed electronic messages. The electronic messaging system may determine how to process an incoming electronic message using at least a portion of the user identifier information. The electronic messaging system determines whether to send a challenge-response message to a sender of an electronic message using at least a portion of the user identifier information. The electronic messaging system may be configured to identify self-addressed electronic messages and, in response to such identification, process the messages appropriately.
    Type: Grant
    Filed: July 28, 2004
    Date of Patent: December 1, 2009
    Assignee: AOL LLC
    Inventors: Jay Logue, Jeffrey N. Heiner, Phillip York Goldman, Susan Rayl Goldman, legal representative
  • Patent number: 7620691
    Abstract: Systems and methods for delivering solicited electronic messages to a client. Senders of electronic messages become authorized senders and electronic messages from the authorized senders are delivered to the intended recipients. Electronic messages from unauthorized senders are not delivered. A sender becomes authorized when a user includes a tracker in the user address that is associated with a particular sender. Electronic messages that include the tracker are only delivered if the sender is the same sender that is associated with the tracker provided by the user. Senders are also authorized by detecting when the user provides a user address to a sender. Users are given the opportunity to opt-in to receiving electronic messages from senders that have registered with the electronic messaging service that provides electronic message services to the users. Authorizing senders in this manner permits the delivery of solicited messages while rejecting unsolicited messages.
    Type: Grant
    Filed: January 9, 2007
    Date of Patent: November 17, 2009
    Assignee: AOL LLC
    Inventors: Phillip Y. Goldman, Richard A. Landsman, Michael R. Migliore, Jeffrey N. Heiner, Jay Logue
  • Patent number: 7590695
    Abstract: A recipient computer system may receive one or more electronic messages. The recipient computer system may send one, two, or more challenge messages to the sender of the electronic messages in determining whether to deliver the electronic message. The recipient computer system may accept or reject an electronic message based on the response, or lack of response, to the challenge messages. The recipient computer system may send two or more challenge messages at intervals. A sender computer system may record activity of the sender computer system for a recipient computer system to use in determining whether to deliver an electronic message. A sender computer system may provide a summary of that activity with an electronic message. A sender computer system may provide an authorization key for a recipient computer system to use in determining whether to deliver an electronic message. The authorization key may be generated by a third party.
    Type: Grant
    Filed: May 7, 2004
    Date of Patent: September 15, 2009
    Assignee: AOL LLC
    Inventors: Richard A. Landsman, Jay Logue, Jeffrey N. Heiner, John S. Evans, Michael R. Migliore, Phillip York Goldman, Susan Rayl Goldman, legal representative
  • Publication number: 20080120661
    Abstract: Systems and methods to dynamically convert Web content to an interactive program for display on resource constrained television clients are described. In particular, a head-end server in a digital television entertainment system downloads the Web content from an external data source. The head-end server dynamically transcodes the downloaded content into an interactive walled garden program (iWGP) that includes MPEG stills and metadata for delivery to a client in the television entertainment system.
    Type: Application
    Filed: January 31, 2008
    Publication date: May 22, 2008
    Applicant: Microsoft Corporation
    Inventors: Edward Ludvig, Jay Logue, Steven Sandke, Brian Feinberg
  • Publication number: 20060242244
    Abstract: Systems and methods for reducing the number of challenge messages that are sent in response to an incoming message in situations where the incoming message is likely not unsolicited. The systems and methods include evaluating the behavior of a sender with regard to one or more federated messaging services and determining if the sender is approved or unapproved. If the sender is approved, the incoming message is deliver to a recipient's inbox without issuing a challenge message. Unapproved senders are required to respond to a challenge message.
    Type: Application
    Filed: April 4, 2005
    Publication date: October 26, 2006
    Inventors: Jay Logue, Richard Landsman, Timothy Sullivan, Phillip Goldman, Susan Goldman
  • Publication number: 20060212520
    Abstract: Systems and methods for allowing challenge messages to be sent directly to a recipient's inbox where normally the challenge message would be sent to a pending folder or deleted. Challenge messages sent between federated messaging services contain a federated token which can be identified, authenticated and validated to determine whether the challenge message should be sent to a recipient's inbox. The federated token can include an authentication portion and a validation portion. Authentication methods for the authentication portion can include, for example, checksums, salts, hashes and digital signatures. Once a federated token is authenticated by decrypting the authentication portion according to one or more of these authentication methods, the federated token is validated by determining the defined use-base and determining whether the receipt of the federated token satisfies the defined use.
    Type: Application
    Filed: March 15, 2005
    Publication date: September 21, 2006
    Inventors: Jay Logue, Timothy Sullivan, Richard Landsman, Phillip Goldman, Susan Goldman