Patents by Inventor Jay Logue
Jay Logue has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10015825Abstract: A method for using a first device to pair a second device to a user account may include receiving first wireless communications using a first wireless protocol, where the first device has previously been paired with the user account. The method may also include receiving a transmission that instructs the first device to establish second wireless communications with the second device, and then establishing the second wireless communications between the first device and the second device using a second wireless protocol. The method may additionally include receiving, using the first wireless protocol, information allowing the second device to use the first wireless protocol, and sending the information to the second device using the second wireless protocol, where a new pairing between the second device and the user account is established using the first wireless protocol.Type: GrantFiled: March 14, 2017Date of Patent: July 3, 2018Assignee: Google LLCInventors: Jay Logue, Grant Erickson, Roger Tinkoff, David Sloo, Anthony M. Fadell, Matthew L. Rogers, Jeffrey A. Boyd, James B. Simister
-
Patent number: 9820315Abstract: A method for establishing a pairing between a smart-home device and an online account may include instantiating an application on a computing device and receiving a first code from a central server. The application may receive a second code from printed material associated with the smart-home device. The smart-home device may broadcast a first communication protocol, and the application may join the first mutation protocol. The application can be authenticated by the smart-home device using the second code, and the application can receive an identity of a second communication protocol from a user. The application can then transmit the identity of the second communication protocol to the smart-home device. The smart-home device can use the second mutation protocol to access the Internet and transmit the first code to the central server, where the central server can use the first code in completing the pairing process.Type: GrantFiled: May 22, 2015Date of Patent: November 14, 2017Assignee: Google Inc.Inventors: Sophie Le Guen, David Sloo, Anthony M. Fadell, Matthew L. Rogers, Shigefumi Honjo, Jay Logue, Grant Erickson, Nicholas Webb, Jeffrey A. Boyd, James B. Simister, Jesse W. Boettcher, Timo A. Bruck, Kevin Coppock, Shiney Rossi
-
Publication number: 20170202039Abstract: A method for using a first device to pair a second device to a user account may include receiving first wireless communications using a first wireless protocol, where the first device has previously been paired with the user account. The method may also include receiving a transmission that instructs the first device to establish second wireless communications with the second device, and then establishing the second wireless communications between the first device and the second device using a second wireless protocol. The method may additionally include receiving, using the first wireless protocol, information allowing the second device to use the first wireless protocol, and sending the information to the second device using the second wireless protocol, where a new pairing between the second device and the user account is established using the first wireless protocol.Type: ApplicationFiled: March 14, 2017Publication date: July 13, 2017Applicant: Google Inc.Inventors: Jay Logue, Grant Erickson, Roger Tinkoff, David Sloo, Anthony M. Fadell, Matthew L. Rogers, Jeffrey A. Boyd, James B. Simister
-
Patent number: 9596708Abstract: include using an application on a mobile device to establish first wireless communications with a first smart-home device that was previously paired with the user account. The method may also include transmitting, to the first smart-home device and using the first wireless protocol, a transmission that instructs the first smart-home device to establish second wireless communications with a second smart-home device, where the second wireless communications use a second wireless protocol. The method may additionally include transmitting network credentials to the first smart-home device using the first wireless protocol, where the credentials are then sent from the first smart-home device to the second smart-home device using the second wireless protocol, such that the second smart-home device can pair with the user account using the first wireless protocol.Type: GrantFiled: April 8, 2016Date of Patent: March 14, 2017Assignee: Google Inc.Inventors: Jay Logue, Grant Erickson, Roger Tinkoff, David Sloo, Anthony M. Fadell, Matthew L. Rogers, Jeffrey A. Boyd, James B. Simister
-
Publication number: 20160249395Abstract: include using an application on a mobile device to establish first wireless communications with a first smart-home device that was previously paired with the user account. The method may also include transmitting, to the first smart-home device and using the first wireless protocol, a transmission that instructs the first smart-home device to establish second wireless communications with a second smart-home device, where the second wireless communications use a second wireless protocol. The method may additionally include transmitting network credentials to the first smart-home device using the first wireless protocol, where the credentials are then sent from the first smart-home device to the second smart-home device using the second wireless protocol, such that the second smart-home device can pair with the user account using the first wireless protocol.Type: ApplicationFiled: April 8, 2016Publication date: August 25, 2016Applicant: Google Inc.Inventors: Jay Logue, Grant Erickson, Roger Tinkoff, David Sloo, Anthony M. Fadell, Matthew L. Rogers, Jeffrey A. Boyd, James B. Simister
-
Patent number: 9332040Abstract: include using an application on a mobile device to establish first wireless communications with a first hazard detector that was previously paired with the user account. The method may also include transmitting, to the first hazard detector and using the first wireless protocol, a transmission that instructs the first hazard detector to establish second wireless communications with a second hazard detector, where the second wireless communications use a second wireless protocol. The method may additionally include transmitting network credentials to the first hazard detector using the first wireless protocol, where the credentials are then sent from the first hazard detector to the second hazard detector using the second wireless protocol, such that the second hazard detector can pair with the user account using the first wireless protocol.Type: GrantFiled: October 7, 2014Date of Patent: May 3, 2016Assignee: Google Inc.Inventors: Jay Logue, Grant Erickson, Roger Tinkoff, David Sloo, Anthony M. Fadell, Matthew L. Rogers, Jeffrey A. Boyd, James B. Simister
-
Publication number: 20150256563Abstract: A method for establishing a pairing between a smart-home device and an online account may include instantiating an application on a computing device and receiving a first code from a central server. The application may receive a second code from printed material associated with the smart-home device. The smart-home device may broadcast a first communication protocol, and the application may join the first mutation protocol. The application can be authenticated by the smart-home device using the second code, and the application can receive an identity of a second communication protocol from a user. The application can then transmit the identity of the second communication protocol to the smart-home device. The smart-home device can use the second mutation protocol to access the Internet and transmit the first code to the central server, where the central server can use the first code in completing the pairing process.Type: ApplicationFiled: May 22, 2015Publication date: September 10, 2015Applicant: GOOGLE INC.Inventors: Sophie Le Guen, David Sloo, Anthony M. Fadell, Matthew L. Rogers, Shigefumi Honjo, Jay Logue, Grant Erickson, Nicholas Webb, Jeffrey A. Boyd, James B. Simister, Jesse W. Boettcher, Timo A. Bruck, Kevin Coppock, Shiney Rossi
-
Patent number: 9049567Abstract: A method for establishing a pairing between a hazard detector and an online account may include instantiating an application on a mobile computing device and receiving a first code from a central server. The application may receive a second code from printed material associated with the hazard detector. The hazard detector may broadcast a Wi-Fi access point, and the application may join the Wi-Fi access point. The application can be authenticated by the hazard detector using the second code, and the application can receive an identity of a home Wi-Fi network from a user. The application can then transmit the identity of the home Wi-Fi network to the hazard detector. The hazard detector can use the home Wi-Fi network to access the Internet and transmit the first code to the central server, where the central server can use the first code in completing the pairing process.Type: GrantFiled: October 7, 2014Date of Patent: June 2, 2015Assignee: Google Inc.Inventors: Sophie Le Guen, David Sloo, Anthony M. Fadell, Matthew L. Rogers, Shigefumi Honjo, Jay Logue, Grant Erickson, Nick Webb, Jeffrey A. Boyd, James B. Simister, Jesse W. Boettcher, Timo A. Bruck, Kevin Coppock, Shiney Rossi
-
Patent number: 9037660Abstract: A recipient computer system may receive one or more electronic messages. The recipient computer system may send one, two, or more challenge messages to the sender of the electronic messages in determining whether to deliver the electronic message. The recipient computer system may accept or reject an electronic message based on the response, or lack of response, to the challenge messages. The recipient computer system may send two or more challenge messages at intervals. A sender computer system may record activity of the sender computer system for a recipient computer system to use in determining whether to deliver an electronic message. A sender computer system may provide a summary of that activity with an electronic message. A sender computer system may provide an authorization key for a recipient computer system to use in determining whether to deliver an electronic message. The authorization key may be generated by a third party.Type: GrantFiled: December 5, 2011Date of Patent: May 19, 2015Assignee: GOOGLE INC.Inventors: Richard A. Landsman, Jay Logue, Jeffrey N. Heiner, John S. Evans, Michael R. Migliore, Susan Rayl Goldman
-
Publication number: 20150100618Abstract: A method for establishing a pairing between a hazard detector and an online account may include instantiating an application on a mobile computing device and receiving a first code from a central server. The application may receive a second code from printed material associated with the hazard detector. The hazard detector may broadcast a Wi-Fi access point, and the application may join the Wi-Fi access point. The application can be authenticated by the hazard detector using the second code, and the application can receive an identity of a home Wi-Fi network from a user. The application can then transmit the identity of the home Wi-Fi network to the hazard detector. The hazard detector can use the home Wi-Fi network to access the Internet and transmit the first code to the central server, where the central server can use the first code in completing the pairing process.Type: ApplicationFiled: October 7, 2014Publication date: April 9, 2015Applicant: Google Inc.Inventors: Sophie Le Guen, David Sloo, Anthony M. Fadell, Matthew L. Rogers, Shigefumi Honjo, Jay Logue, Grant Erickson, Nick Webb, Jeffrey A. Boyd, James B. Simister, Jesse W. Boettcher, Timo A. Bruck, Kevin Coppock, Shiney Rossi
-
Publication number: 20150097689Abstract: include using an application on a mobile device to establish first wireless communications with a first hazard detector that was previously paired with the user account. The method may also include transmitting, to the first hazard detector and using the first wireless protocol, a transmission that instructs the first hazard detector to establish second wireless communications with a second hazard detector, where the second wireless communications use a second wireless protocol. The method may additionally include transmitting network credentials to the first hazard detector using the first wireless protocol, where the credentials are then sent from the first hazard detector to the second hazard detector using the second wireless protocol, such that the second hazard detector can pair with the user account using the first wireless protocol.Type: ApplicationFiled: October 7, 2014Publication date: April 9, 2015Applicant: Google Inc.Inventors: Jay Logue, Grant Erickson, Roger Tinkoff, David Sloo, Anthony M. Fadell, Matthew L. Rogers, Jeffrey A. Boyd, James B. Simister
-
Publication number: 20120079050Abstract: A recipient computer system may receive one or more electronic messages. The recipient computer system may send one, two, or more challenge messages to the sender of the electronic messages in determining whether to deliver the electronic message. The recipient computer system may accept or reject an electronic message based on the response, or lack of response, to the challenge messages. The recipient computer system may send two or more challenge messages at intervals. A sender computer system may record activity of the sender computer system for a recipient computer system to use in determining whether to deliver an electronic message. A sender computer system may provide a summary of that activity with an electronic message. A sender computer system may provide an authorization key for a recipient computer system to use in determining whether to deliver an electronic message. The authorization key may be generated by a third party.Type: ApplicationFiled: December 5, 2011Publication date: March 29, 2012Inventors: Phillip York Goldman, Susan Rayl Goldman, Richard A. Landsman, Jay Logue, Jeffrey N. Heiner, John S. Evans, Michael R. Migliore
-
Patent number: 8073916Abstract: A recipient computer system may receive one or more electronic messages. The recipient computer system may send one, two, or more challenge messages to the sender of the electronic messages in determining whether to deliver the electronic message. The recipient computer system may accept or reject an electronic message based on the response, or lack of response, to the challenge messages. The recipient computer system may send two or more challenge messages at intervals. A sender computer system may record activity of the sender computer system for a recipient computer system to use in determining whether to deliver an electronic message. A sender computer system may provide a summary of that activity with an electronic message. A sender computer system may provide an authorization key for a recipient computer system to use in determining whether to deliver an electronic message. The authorization key may be generated by a third party.Type: GrantFiled: August 6, 2009Date of Patent: December 6, 2011Assignee: AOL Inc.Inventors: Richard A. Landsman, Jay Logue, Jeffrey N. Heiner, John S. Evans, Michael R. Migliore
-
Publication number: 20090307326Abstract: A recipient computer system may receive one or more electronic messages. The recipient computer system may send one, two, or more challenge messages to the sender of the electronic messages in determining whether to deliver the electronic message. The recipient computer system may accept or reject an electronic message based on the response, or lack of response, to the challenge messages. The recipient computer system may send two or more challenge messages at intervals. A sender computer system may record activity of the sender computer system for a recipient computer system to use in determining whether to deliver an electronic message. A sender computer system may provide a summary of that activity with an electronic message. A sender computer system may provide an authorization key for a recipient computer system to use in determining whether to deliver an electronic message. The authorization key may be generated by a third party.Type: ApplicationFiled: August 6, 2009Publication date: December 10, 2009Applicant: AOL LLCInventors: Richard A. Landsman, Jay Logue, Jeffrey N. Heiner, John S. Evans, Michael R. Migliore
-
Patent number: 7627635Abstract: A system may include an electronic messaging system that may access user identifier information, which may be used to identify self-addressed electronic messages. The electronic messaging system may determine how to process an incoming electronic message using at least a portion of the user identifier information. The electronic messaging system determines whether to send a challenge-response message to a sender of an electronic message using at least a portion of the user identifier information. The electronic messaging system may be configured to identify self-addressed electronic messages and, in response to such identification, process the messages appropriately.Type: GrantFiled: July 28, 2004Date of Patent: December 1, 2009Assignee: AOL LLCInventors: Jay Logue, Jeffrey N. Heiner, Phillip York Goldman, Susan Rayl Goldman, legal representative
-
Patent number: 7620691Abstract: Systems and methods for delivering solicited electronic messages to a client. Senders of electronic messages become authorized senders and electronic messages from the authorized senders are delivered to the intended recipients. Electronic messages from unauthorized senders are not delivered. A sender becomes authorized when a user includes a tracker in the user address that is associated with a particular sender. Electronic messages that include the tracker are only delivered if the sender is the same sender that is associated with the tracker provided by the user. Senders are also authorized by detecting when the user provides a user address to a sender. Users are given the opportunity to opt-in to receiving electronic messages from senders that have registered with the electronic messaging service that provides electronic message services to the users. Authorizing senders in this manner permits the delivery of solicited messages while rejecting unsolicited messages.Type: GrantFiled: January 9, 2007Date of Patent: November 17, 2009Assignee: AOL LLCInventors: Phillip Y. Goldman, Richard A. Landsman, Michael R. Migliore, Jeffrey N. Heiner, Jay Logue
-
Patent number: 7590695Abstract: A recipient computer system may receive one or more electronic messages. The recipient computer system may send one, two, or more challenge messages to the sender of the electronic messages in determining whether to deliver the electronic message. The recipient computer system may accept or reject an electronic message based on the response, or lack of response, to the challenge messages. The recipient computer system may send two or more challenge messages at intervals. A sender computer system may record activity of the sender computer system for a recipient computer system to use in determining whether to deliver an electronic message. A sender computer system may provide a summary of that activity with an electronic message. A sender computer system may provide an authorization key for a recipient computer system to use in determining whether to deliver an electronic message. The authorization key may be generated by a third party.Type: GrantFiled: May 7, 2004Date of Patent: September 15, 2009Assignee: AOL LLCInventors: Richard A. Landsman, Jay Logue, Jeffrey N. Heiner, John S. Evans, Michael R. Migliore, Phillip York Goldman, Susan Rayl Goldman, legal representative
-
Publication number: 20080120661Abstract: Systems and methods to dynamically convert Web content to an interactive program for display on resource constrained television clients are described. In particular, a head-end server in a digital television entertainment system downloads the Web content from an external data source. The head-end server dynamically transcodes the downloaded content into an interactive walled garden program (iWGP) that includes MPEG stills and metadata for delivery to a client in the television entertainment system.Type: ApplicationFiled: January 31, 2008Publication date: May 22, 2008Applicant: Microsoft CorporationInventors: Edward Ludvig, Jay Logue, Steven Sandke, Brian Feinberg
-
Publication number: 20060242244Abstract: Systems and methods for reducing the number of challenge messages that are sent in response to an incoming message in situations where the incoming message is likely not unsolicited. The systems and methods include evaluating the behavior of a sender with regard to one or more federated messaging services and determining if the sender is approved or unapproved. If the sender is approved, the incoming message is deliver to a recipient's inbox without issuing a challenge message. Unapproved senders are required to respond to a challenge message.Type: ApplicationFiled: April 4, 2005Publication date: October 26, 2006Inventors: Jay Logue, Richard Landsman, Timothy Sullivan, Phillip Goldman, Susan Goldman
-
Publication number: 20060212520Abstract: Systems and methods for allowing challenge messages to be sent directly to a recipient's inbox where normally the challenge message would be sent to a pending folder or deleted. Challenge messages sent between federated messaging services contain a federated token which can be identified, authenticated and validated to determine whether the challenge message should be sent to a recipient's inbox. The federated token can include an authentication portion and a validation portion. Authentication methods for the authentication portion can include, for example, checksums, salts, hashes and digital signatures. Once a federated token is authenticated by decrypting the authentication portion according to one or more of these authentication methods, the federated token is validated by determining the defined use-base and determining whether the receipt of the federated token satisfies the defined use.Type: ApplicationFiled: March 15, 2005Publication date: September 21, 2006Inventors: Jay Logue, Timothy Sullivan, Richard Landsman, Phillip Goldman, Susan Goldman