Patents by Inventor Jeffrey Robert Naujok
Jeffrey Robert Naujok has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11968523Abstract: Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, to form a secure channel, such as between or among a communications device, a client computing resource, and/or an identity verifier. In particular embodiments, a method may include recognizing via a subscriber identifier, a known communications device within a communications network. The method may additionally include issuing an eSIM to the communications device via the communications network in response to recognizing the communications device and relating the eSIM to the subscriber identifier of the communications device. The method may further include, responsive to receipt of one or more signals from a client computing resource, utilizing encryption provided by the eSIM to form a secure channel between or among the communications device and an identity verifier.Type: GrantFiled: August 19, 2021Date of Patent: April 23, 2024Assignee: PROVE IDENTITY, INC.Inventors: Jeffrey Robert Naujok, Rodger R. Desai, Michael Bijelich, Aditya Khurjekar
-
Patent number: 11831731Abstract: Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, to prove possession of a communications device, such as a mobile communications device. In a particular method, proving possession of a communications device may include receiving, from a client server, an indicator to indicate a communication services carrier servicing the communications device. The method may continue with generating a session identifier and a resource locator to direct the communications device to establish communications with an identity verifier at an address corresponding to the resource locator. The resource locator may be determined based, at least in part, on the indicator received from the client server. The method may additionally include the communications device transmitting one or more identifiers, determined, at least in part, from content stored within, or data derived from, memory of the communications device.Type: GrantFiled: February 23, 2021Date of Patent: November 28, 2023Assignee: PROVE IDENTITY, INC.Inventor: Jeffrey Robert Naujok
-
Publication number: 20230232208Abstract: Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, using one or more computing devices to obtain, from a communications device, an identifier of the communications device transmitted via a communications network. The communications network may transmit a request for one or more parameters unique to a subscriber of the communications network. The method may also include processing signals indicative of the requested one or more parameters in response to the subscriber entering the one or more parameters into a graphical user interface of the communications device. The method may further include transmitting, to the communications device, one or more signals to provide a complement of subscriber parameters.Type: ApplicationFiled: March 23, 2023Publication date: July 20, 2023Inventors: Jeffrey Robert Naujok, Prashant Janakrai Desai, Michael Stearne, Rodger R. Desai, Ryan Alexander, Kyle Price
-
Publication number: 20230085137Abstract: Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented to authenticate a communicating device via a communications network. One embodiment may include obtaining, at the communicating device, signals representative of one or more high-entropy tokens via the communications network, the one or more high-entropy tokens including one or more component tokens. The method may additionally include encrypting one or more parameters utilizing a first encryption key derived from at least one component token of the one or more component tokens and transmitting, via the communications network, one or more signals representative of the encrypted one or more parameters. The method may further include obtaining, at the communicating device, one or more signals indicating an outcome of a comparison between the one or more encrypted parameters with one or more similar parameters encrypted by an identity verifier.Type: ApplicationFiled: September 14, 2021Publication date: March 16, 2023Inventor: Jeffrey Robert Naujok
-
Publication number: 20230054006Abstract: Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, to form a secure channel, such as between or among a communications device, a client computing resource, and/or an identity verifier. In particular embodiments, a method may include recognizing via a subscriber identifier, a known communications device within a communications network. The method may additionally include issuing an eSIM to the communications device via the communications network in response to recognizing the communications device and relating the eSIM to the subscriber identifier of the communications device. The method may further include, responsive to receipt of one or more signals from a client computing resource, utilizing encryption provided by the eSIM to form a secure channel between or among the communications device and an identity verifier.Type: ApplicationFiled: August 19, 2021Publication date: February 23, 2023Inventors: Jeffrey Robert Naujok, Rodger R. Desai, Michael Bijelich, Aditya Khurjekar
-
Publication number: 20220377065Abstract: Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, to authenticate a communications device. In an embodiment, the method may include accessing a prepackaged group of computer instructions and invoking an authentication operation of the communications device. The method may additionally include determining availability of a cellular communications channel to communicate with a client server and initiating a browser session to pass hardware-specific parameters to and from the client server. The method may further include receiving an outcome of the authentication operation, in which invoking of the authentication operation and receiving the outcome of the authentication operation occur during a single exchange between a client application and the prepackaged group of computer instructions.Type: ApplicationFiled: May 18, 2022Publication date: November 24, 2022Inventors: Jeffrey Robert Naujok, Alan Switzer
-
Publication number: 20220350878Abstract: Methods, apparatuses, and/or articles of manufacture may be implemented to authenticate a subscriber of a communications device. The method may include receiving, via a server coupled to a network, a first signal that indicates a modification of one or more location descriptors corresponding to a communications device. The modification may occur in connection with receipt of the one or more location descriptors by an emergency services provider. The method may include storing a record of the modification of the one or more location descriptors in response to creation of one or more new location descriptors corresponding to a subscriber identifier, modification of one or more previously existing location descriptors corresponding to the subscriber identifier, or deletion of the subscriber identifier. The method may additionally include generating a second signal to form or update an electronic or digital identity of the communications device responsive to receiving the first signal.Type: ApplicationFiled: April 30, 2021Publication date: November 3, 2022Inventors: Jeffrey Robert Naujok, Greg Bonin, Christopher Cunningham
-
Publication number: 20220329434Abstract: Briefly, methods, apparatuses, and/or articles of manufacture may be implemented to authenticate a subscriber of a communications device. The method may include receiving, such as at an authenticating server via a client server, an indication that a subscriber is attempting to access secure content via the communications device. The method may continue with transmitting one or more anonymizing parameters from the authentication server to the communications device. The method may continue with receiving, by the authentication server, in response to transmitting the one or more anonymizing parameters to the communications device, first one or more anonymized values computed using the one or more anonymizing parameters and one or more biometric attributes of the subscriber. The method may continue with authenticating the subscriber based, at least in part, on comparing the received one or more anonymized values with the one or more anonymized values computed at the authentication server.Type: ApplicationFiled: April 8, 2021Publication date: October 13, 2022Inventor: Jeffrey Robert Naujok
-
Publication number: 20220272158Abstract: Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, to prove possession of a communications device, such as a mobile communications device. In a particular method, proving possession of a communications device may include receiving, from a client server, an indicator to indicate a communication services carrier servicing the communications device. The method may continue with generating a session identifier and a resource locator to direct the communications device to establish communications with an identity verifier at an address corresponding to the resource locator. The resource locator may be determined based, at least in part, on the indicator received from the client server. The method may additionally include the communications device transmitting one or more identifiers, determined, at least in part, from content stored within, or data derived from, memory of the communications device.Type: ApplicationFiled: February 23, 2021Publication date: August 25, 2022Inventor: Jeffrey Robert Naujok
-
Publication number: 20220217527Abstract: Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, using one or more computing devices to obtain, from a communications device, an identifier of the communications device transmitted via a communications network. The communications network may transmit a request for one or more parameters unique to a subscriber of the communications network. The method may also include processing signals indicative of the requested one or more parameters in response to the subscriber entering the one or more parameters into a graphical user interface of the communications device. The method may further include transmitting, to the communications device, one or more signals to provide a complement of subscriber parameters.Type: ApplicationFiled: January 6, 2022Publication date: July 7, 2022Inventors: Jeffrey Robert Naujok, Prashant Janakrai Desai, Michael Stearne, Rodger R. Desai, Ryan Alexander, Kyle Price
-
Publication number: 20220210657Abstract: Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented to represent an identity network corresponding to a communications device subscriber in an electronic or digital domain. The method may include transmitting a message to a communications device. Responsive to the transmitted message, an authenticator may receive a signal to verify that a subscriber having a real-world identity is co-located with the communications device.Type: ApplicationFiled: December 29, 2021Publication date: June 30, 2022Inventors: Prashant Janakrai DESAI, David Louis BERRA, Rodger R. DESAI, Michael BIJELICH, Jeffrey Robert NAUJOK, Michael STEARNE
-
Publication number: 20220129900Abstract: Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, using one or more computing devices to receive at a server device coupled to a communications network, a first signal indicating that a subscriber of a mobile device has initiated a transaction. The method may continue with accessing a data store to determine occurrence of one or more deterministic events with respect to the mobile device and accessing the data store to determine one or more behavior norms specific to the subscriber with respect to the mobile device. The method may additionally include generating, by the server coupled to the communications network, a second signal indicating an authorization status of the transaction, the authorization status being dependent on the occurrence of the one or more deterministic events in relation to the one or more behavior norms.Type: ApplicationFiled: October 27, 2020Publication date: April 28, 2022Inventors: Jeffrey Robert Naujok, Christopher Cunningham, Prashant Janakrai Desai