Patents by Inventor Joel Voss

Joel Voss has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11762966
    Abstract: A method in an electronic device includes comparing, with one or more processors, at least one image with one or more predefined reference images and determining whether the at least one image comprises a depiction of a mien expressed by the object. When the object is authenticated as the authorized user of the electronic device and the at least one image fails to comprise the depiction of the mien expressed by the object, the one or more processors grant limited operational access to features, applications, or data of the electronic device. When the object is authenticated as the authorized user of the electronic device and the at least one image comprises the depiction of the mien expressed by the object, the one or more processors can grant full operational access to the features, the applications, or the data of the electronic device.
    Type: Grant
    Filed: April 2, 2020
    Date of Patent: September 19, 2023
    Assignee: Motorola Mobility LLC
    Inventors: Ranjeet Gupta, Joel Voss, Thomas Ubensee, Wendel Malta De Assis
  • Patent number: 11228581
    Abstract: Systems and methods for authenticating a user of a mobile electronic device to use a FIDO (fast identification online) compliant application in the device are provided. These entail receiving a user authentication input at the mobile electronic device and caching the authentication input. While the authentication input remains cached, the user is authenticated to use the mobile electronic device via the authentication input. The mobile electronic device is then unlocked and the FIDO compliant application is opened. Secure delayed FIDO authentication is then executed by providing the cached authentication input to the FIDO compliant application to open an authenticated session of the user on the FIDO compliant application.
    Type: Grant
    Filed: March 7, 2019
    Date of Patent: January 18, 2022
    Assignee: Motorola Mobility LLC
    Inventors: Jarrett Simerson, Rachid Alameh, Joel Voss
  • Publication number: 20210312024
    Abstract: A method in an electronic device includes comparing, with one or more processors, at least one image with one or more predefined reference images and determining whether the at least one image comprises a depiction of a mien expressed by the object. When the object is authenticated as the authorized user of the electronic device and the at least one image fails to comprise the depiction of the mien expressed by the object, the one or more processors grant limited operational access to features, applications, or data of the electronic device. When the object is authenticated as the authorized user of the electronic device and the at least one image comprises the depiction of the mien expressed by the object, the one or more processors can grant full operational access to the features, the applications, or the data of the electronic device.
    Type: Application
    Filed: April 2, 2020
    Publication date: October 7, 2021
    Inventors: Ranjeet Gupta, Joel Voss, Thomas Ubensee, Wendel Malta De Assis
  • Publication number: 20200287889
    Abstract: Systems and methods for authenticating a user of a mobile electronic device to use a FIDO (fast identification online) compliant application in the device are provided. These entail receiving a user authentication input at the mobile electronic device and caching the authentication input. While the authentication input remains cached, the user is authenticated to use the mobile electronic device via the authentication input. The mobile electronic device is then unlocked and the FIDO compliant application is opened. Secure delayed FIDO authentication is then executed by providing the cached authentication input to the FIDO compliant application to open an authenticated session of the user on the FIDO compliant application.
    Type: Application
    Filed: March 7, 2019
    Publication date: September 10, 2020
    Applicant: Motorola Mobility LLC
    Inventors: Jarrett Simerson, Rachid Alameh, Joel Voss
  • Patent number: 8880894
    Abstract: A method, telecommunication apparatus, and electronic device for securely creating an identity data block are disclosed. A secure memory 208 may store a unique private key 326 associated with a unique public key 328. A processor 204 may generate the identity data block 332 in the secure memory 208 using the unique private key 326. The processor 204 may erase the unique private key 326 from the secure memory 208.
    Type: Grant
    Filed: June 26, 2009
    Date of Patent: November 4, 2014
    Assignee: Motorola Mobility LLC
    Inventors: Joel Voss, Joseph Hansen, Kent Rager
  • Patent number: 8412270
    Abstract: A method, telecommunication apparatus, and electronic device for securely using a subscriber identity module are disclosed. A secure memory 308 may store a secure international mobile subscriber identity. A subscriber identity module interface 312 may receive an unlocking international mobile subscriber identity. A processor 304 may erase a cache temporary mobile subscriber identity if the unlocking international mobile subscriber identity does not match the secure international mobile subscriber identity.
    Type: Grant
    Filed: August 8, 2008
    Date of Patent: April 2, 2013
    Assignee: Motorola Mobility LLC
    Inventors: Kent Rager, Joel Voss
  • Publication number: 20100169660
    Abstract: A method, telecommunication apparatus, and electronic device for securely creating an identity data block are disclosed. A secure memory 208 may store a unique private key 326 associated with a unique public key 328. A processor 204 may generate the identity data block 332 in the secure memory 208 using the unique private key 326. The processor 204 may erase the unique private key 326 from the secure memory 208.
    Type: Application
    Filed: June 26, 2009
    Publication date: July 1, 2010
    Applicant: Motorola, Inc.
    Inventors: Joel Voss, Joseph Hansen, Kent Rager
  • Publication number: 20100035577
    Abstract: A method, telecommunication apparatus, and electronic device for securely using a subscriber identity module are disclosed. A secure memory 308 may store a secure international mobile subscriber identity. A subscriber identity module interface 312 may receive an unlocking international mobile subscriber identity. A processor 304 may erase a cache temporary mobile subscriber identity if the unlocking international mobile subscriber identity does not match the secure international mobile subscriber identity.
    Type: Application
    Filed: August 8, 2008
    Publication date: February 11, 2010
    Applicant: Motorola, Inc.
    Inventors: Kent RAGER, Joel Voss
  • Publication number: 20070050622
    Abstract: Techniques are provided for preventing replacement of a one-time-programmable (OTP) component. The OTP component can be part of a wireless device. The wireless device is configured such that programming of a new IMEI code into the OTP component is permitted only when the wireless device is in a secure-mode state. A challenge-response protocol is used to place the wireless device in this secure-mode state.
    Type: Application
    Filed: September 1, 2005
    Publication date: March 1, 2007
    Inventors: Kent Rager, Joseph Hansen, Keyur Khambholja, Joel Voss
  • Publication number: 20060136727
    Abstract: A server, e.g., a client (105, 107, 109), receives a request for a digital signature to be applied to digital information, obtains a representation of the information, determines a designation of key pair(s) to be applied thereto; and transmits a request for the digital signature to a front end server (103a, 103b). The front end server determines one or more of whether the client is authentic and authorized, the user identifier is authentic, and the user identifier is permitted to make the request. If so, the front end server transmits a request to generate a digital signature to a back end server (101). The back end server determines one or more of whether the front end server is authentic and the designated key pair correspond to the requesting front end server. If so, the back end server generates the digital signature based on the information and the key pair(s).
    Type: Application
    Filed: December 20, 2004
    Publication date: June 22, 2006
    Inventors: Joel Voss, Ronald Buskey, Joseph Hansen, David Hartley, Michael Terrington