Patents by Inventor John Neystadt

John Neystadt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200053129
    Abstract: Among other things, this document describes systems, methods and devices for discovering and identifying client devices that attempt to access out-of-policy network services via a secure web gateway (or other network security gateway) that lacks visibility into the client network actual IP space. This is a common problem with cloud hosted SWG services that enforce access policy from outside of a customer network (e.g., external to an enterprise network), due to network address translation at the interface between the customer network and the public Internet where the cloud-hosted SWG resides. The teachings hereof address this problem. In one embodiment, a cloud hosted SWG can redirect a client to a bouncer device inside the customer network; that bouncer device can capture the actual client IP address.
    Type: Application
    Filed: August 13, 2018
    Publication date: February 13, 2020
    Applicant: Akamai Technologies, Inc.
    Inventors: Eugene (John) Neystadt, Michael Graham, John Devasia
  • Patent number: 10362617
    Abstract: A method and a system for accessing through a second mobile telecommunication network to services offered by a first mobile telecommunication network comprising the steps of: establishing a first communication channel with the second network, based on a secondary SIM card; establishing a second communication channel with the first network using the first communication channel, wherein a user of the mobile communication device is authenticated using a primary SIM card; registering, through the second communication channel, the user of the mobile communication device into the first network using the information stored in the primary SIM card; and accessing from the mobile communication device to services offered by the first network through the second communication channel.
    Type: Grant
    Filed: October 11, 2017
    Date of Patent: July 23, 2019
    Assignee: TELEFONICA DIGITAL ESPAÑA
    Inventors: Jorge Serna, John Neystadt, David Gallegos
  • Patent number: 10349274
    Abstract: Aspects of the subject matter described herein relate to a simplified login for mobile devices. In aspects, on a first logon, a mobile device asks a user to enter credentials and a PIN. The credentials and PIN are sent to a server which validates user credentials. If the user credentials are valid, the server encrypts data that includes at least the user credentials and the PIN and sends the encrypted data to the mobile device. In subsequent logons, the user may logon using only the PIN. During login, the mobile device sends the PIN in conjunction with the encrypted data. The server can then decrypt the data and compare the received PIN with the decrypted PIN. If the PINs are equal, the server may grant access to a resource according to the credentials.
    Type: Grant
    Filed: November 27, 2017
    Date of Patent: July 9, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Meir Mendelovich, John Neystadt, Ken Aoyama, Nir Nice, Shay Yehuda Gurman
  • Patent number: 10116580
    Abstract: Described is a technology by which a seamless automatic connection to an (e.g., corporate) network is made for a client device. Upon detecting a need for a connection to a network, such as by intercepting a communication directed towards a network destination, a list of available connection methods is automatically obtained based on the device's current location data (e.g., LAN or remote) and policy information. An available connection method from the list is selected, e.g., in order, and an attempt is made to establish a connection via that connection method. If the attempt fails, another attempt is made with a different connection method, and so on, until a connection method succeeds. Additional seamlessness from the user's perspective is provided via a credentials vault, by which stored credentials may be retrieved and used in association with the access method being attempted.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: October 30, 2018
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Ehud Mordechai Itshaki, Nir Nice, Eugene John Neystadt, Noam Gershon Ben-Yochanan
  • Publication number: 20180110081
    Abstract: A method and a system for accessing through a second mobile telecommunication network to services offered by a first mobile telecommunication network comprising the steps of establishing a first communication channel with the second network, based on a secondary SIM card; establishing a second communication channel with the first network using the first communication channel, wherein a user of the mobile communication device is authenticated using a primary SIM card; registering, through the second communication channel, the user of the mobile communication device into the first network using the information stored in the primary SIM card; and accessing from the mobile communication device to services offered by the first network through the second communication channel.
    Type: Application
    Filed: October 11, 2017
    Publication date: April 19, 2018
    Inventors: JORGE SERNA, JOHN NEYSTADT, DAVID GALLEGOS
  • Publication number: 20180084422
    Abstract: Aspects of the subject matter described herein relate to a simplified login for mobile devices. In aspects, on a first logon, a mobile device asks a user to enter credentials and a PIN. The credentials and PIN are sent to a server which validates user credentials. If the user credentials are valid, the server encrypts data that includes at least the user credentials and the PIN and sends the encrypted data to the mobile device. In subsequent logons, the user may logon using only the PIN. During login, the mobile device sends the PIN in conjunction with the encrypted data. The server can then decrypt the data and compare the received PIN with the decrypted PIN. If the PINs are equal, the server may grant access to a resource according to the credentials.
    Type: Application
    Filed: November 27, 2017
    Publication date: March 22, 2018
    Inventors: Meir Mendelovich, John Neystadt, Ken Aoyama, Nir Nice, Shay Yehuda Gurman
  • Patent number: 9870424
    Abstract: A ranked set of users may be calculated from an expertise categorization for each user and a person's trust in the users for specific categories. The ranked set of users may be used for presenting search results, recommendations, social marketing, or other uses. A person's reputation may be determined through various online activities. A person's trust in another person may be related to their proximity and activity in one or more social networks.
    Type: Grant
    Filed: March 8, 2011
    Date of Patent: January 16, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Eugene (John) Neystadt, Ron Karidi, Yitzhak Tzahi Weisfeild, Roy Varshavsky, Avigad Oron, Kira Radinsky
  • Patent number: 9832642
    Abstract: Aspects of the subject matter described herein relate to a simplified login for mobile devices. In aspects, on a first logon, a mobile device asks a user to enter credentials and a PIN. The credentials and PIN are sent to a server which validates user credentials. If the user credentials are valid, the server encrypts data that includes at least the user credentials and the PIN and sends the encrypted data to the mobile device. In subsequent logons, the user may logon using only the PIN. During login, the mobile device sends the PIN in conjunction with the encrypted data. The server can then decrypt the data and compare the received PIN with the decrypted PIN. If the PINs are equal, the server may grant access to a resource according to the credentials.
    Type: Grant
    Filed: October 5, 2015
    Date of Patent: November 28, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Meir Mendelovich, John Neystadt, Ken Aoyama, Nir Nice, Shay Yehuda Gurman
  • Patent number: 9633110
    Abstract: Methods, systems, and computer program products are provided for automatically enriching data in tables of report documents. A table of data contained in a document is received. A category of data stored in a column of the table of data is determined Enhancement information associated with the determined category is retrieved. The enhancement information may include visual enhancements (e.g., symbols, images, etc.) and/or may include reference data that is related to the determined category of column data. A user is enabled to select enhancement information of the retrieved enhancement information. The selected enhancement information is displayed in the document. The user is enabled to accept the selected enhancement information to be stored in the document.
    Type: Grant
    Filed: November 15, 2011
    Date of Patent: April 25, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Meir Mendelovich, Eugene (John) Neystadt, Dany Hoter
  • Patent number: 9344432
    Abstract: Embodiments of the invention provide techniques for basing access control decisions at the network layer at least in part on information provided in claims, which may describe attributes of a computer requesting access, one or more resources to which access is requested, the user, the circumstances surrounding the requested access, and/or other information. The information may be evaluated based on one or more access control policies, which may be pre-set or dynamically generated, and used in making a decision whether to grant or deny the computer access to the specified resource(s).
    Type: Grant
    Filed: June 24, 2010
    Date of Patent: May 17, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Yair Tor, Daniel Rose, Eugene (John) Neystadt, Patrik Schnell, Moshe Sapir, Oleg Ananiev, Arthur Zavalkovsky, Anat Eyal
  • Publication number: 20160037343
    Abstract: Aspects of the subject matter described herein relate to a simplified login for mobile devices. In aspects, on a first logon, a mobile device asks a user to enter credentials and a PIN. The credentials and PIN are sent to a server which validates user credentials. If the user credentials are valid, the server encrypts data that includes at least the user credentials and the PIN and sends the encrypted data to the mobile device. In subsequent logons, the user may logon using only the PIN. During login, the mobile device sends the PIN in conjunction with the encrypted data. The server can then decrypt the data and compare the received PIN with the decrypted PIN. If the PINs are equal, the server may grant access to a resource according to the credentials.
    Type: Application
    Filed: October 5, 2015
    Publication date: February 4, 2016
    Inventors: Meir Mendelovich, John Neystadt, Ken Aoyama, Nir Nice, Shay Yehuda Gurman
  • Patent number: 9154505
    Abstract: Aspects of the subject matter described herein relate to a simplified login for mobile devices. In aspects, on a first logon, a mobile device asks a user to enter credentials and a PIN. The credentials and PIN are sent to a server which validates user credentials. If the user credentials are valid, the server encrypts data that includes at least the user credentials and the PIN and sends the encrypted data to the mobile device. In subsequent logons, the user may logon using only the PIN. During login, the mobile device sends the PIN in conjunction with the encrypted data. The server can then decrypt the data and compare the received PIN with the decrypted PIN. If the PINs are equal, the server may grant access to a resource according to the credentials.
    Type: Grant
    Filed: January 13, 2014
    Date of Patent: October 6, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Meir Mendelovich, John Neystadt, Ken Aoyama, Nir Nice, Shay Yehuda Gurman
  • Publication number: 20150269627
    Abstract: A user-profiling method for providing advertisement data and/or online content to a user and a computer program. In the user-profiling method a user provided with a computing device maintains a voice and/or a video communication with a second user through a communications provider, the method comprising: receiving a profiling engine said voice and/or said video communication from said communications provider as an input; processing said profiling engine, by means of an algorithm, a plurality of keywords related to data identifying a plurality of profiling parameters obtained from said voice or said video communication in order to obtain a user profile, and providing data advertisement and/or online content to said user on the basis of said obtained user profile.
    Type: Application
    Filed: October 18, 2013
    Publication date: September 24, 2015
    Applicants: JAJAH LTD., TELEFONICA, S.A.
    Inventors: Diego Urdiales Delgado, Nick Mullen, John Neystadt
  • Patent number: 9111079
    Abstract: Embodiments of the invention make the issuance of trustworthy device claims available to client devices as a service, so that a client device to which device claims are issued may use the device claims in relation to an attempt to access a network application. The service may conduct an assessment of the device's characteristics and/or state, characterize the results of this assessment in device claims, and issue the device claims to the device. The service may be accessible to a client device from outside administrative boundaries of an entity that makes a network application accessible, and thus may be useful to entities making network applications accessible in business-to-consumer (B2C) and business-to-business (B2B) topologies, such as over the publicly accessible Internet.
    Type: Grant
    Filed: January 27, 2011
    Date of Patent: August 18, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Eugene (John) Neystadt, Daniel Alon, Yair Tor, Mark Novak, Khaja E. Ahmed, Yoav Yassour
  • Publication number: 20150189004
    Abstract: The method comprises creating a single point in a communication flow, by a first farm load balancer, that both communication sessions requested by a client server A and a client server B at a network layer will pass through; creating stickiness based on said communication session requests and creates a bi-directional affinity by correlating the communication session requests of different sessions and maintaining a correlation mapping.
    Type: Application
    Filed: December 23, 2014
    Publication date: July 2, 2015
    Applicant: TELEFONICA DIGITAL ESPANA, S.L.U.
    Inventors: Alex MASSOVER, John NEYSTADT
  • Patent number: 9055107
    Abstract: The method of delegating authentication, within a chain of entities, relies upon a recording of at least a portion of a TLS handshake between a gateway device and user, in which the user needs access to a desired server. The method then relies upon re-verification of cryptographic evidence in the recorded portion of the TLS handshake, which is forwarded either (1) to the server to which access is desired, in which case the server re-verifies the recorded portion to confirm authentication, or, (2) to a third party entity, in which case the third party entity confirms authentication and provides credentials to the gateway server which then uses the credentials to authenticate to the server as the user.
    Type: Grant
    Filed: December 1, 2006
    Date of Patent: June 9, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Gennady Medvinsky, Nir Nice, Tomer Shiran, Alexander Teplitsky, Paul Leach, John Neystadt
  • Patent number: 9049262
    Abstract: A method and system for combined Peer-to-Peer (P2P) conferencing and central relay server-based conferencing using a telephony and conferencing protocol that includes Web Real-Time Communication (WebRTC) or Session Initiation Protocol (SIP), including receiving by a central relay server a request from a client device to participate in a conference call, comparing by the central relay server a received client device policy and a central relay server policy for selecting at least one of the P2P conferencing or the central relay server-based conferencing, and selecting at least one suggested connection mode for the client device based on a result of the comparing of the received client device policy and the central relay server policy, the combined P2P conferencing and central relay server-based conferencing including mixing server-based conferencing streams and P2P conferencing streams.
    Type: Grant
    Filed: February 21, 2014
    Date of Patent: June 2, 2015
    Assignee: TELEFONICA DIGITAL ESPAÑA, S.L.U.
    Inventors: Alex Massover, Gustavo Garcia, John Neystadt
  • Patent number: 8997196
    Abstract: Systems, methods and apparatus for accessing at least one resource hosted by at least one server of a cloud service provider. In some embodiments, a client computer sends authentication information associated with a user of the client computer and a statement of health regarding the client computer to an access control gateway deployed in an enterprise's managed network. The access control gateway authenticates the user and determines whether the user is authorized to access the at least one resource hosted in the cloud. If the user authentication and authorization succeeds, the access control gateway requests a security token from a security token service trusted by an access control component in the cloud and forwards the security token to the client computer. The client computer sends the security token to the access component in the cloud to access the at least one resource from the at least one server.
    Type: Grant
    Filed: June 14, 2010
    Date of Patent: March 31, 2015
    Assignee: Microsoft Corporation
    Inventors: Asaf Kariv, Oleg Ananiev, Eli Tovbeyn, Daniel Kershaw, Eugene (John) Neystadt
  • Patent number: 8955108
    Abstract: A security system collects an audit trail on a computer outside of a boundary created by one or more virtual machines. The security system uses a privileged virtual machine to collect audit logs for each protected virtual machine. As the protected virtual machines run, they send auditing information to the privileged virtual machine. The privileged virtual machine can collect auditing information from protected virtual machines much more quickly than a network server, as well as collecting auditing events from multiple protected virtual machines. Because the auditing destination is located on the same computer as the virtual machine monitored by the audit trail, no network dependency is present. Thus, the security system allows for monitoring the activity of administrators and other users while preventing tampering with the audit trail of each user's actions.
    Type: Grant
    Filed: June 17, 2009
    Date of Patent: February 10, 2015
    Assignee: Microsoft Corporation
    Inventors: John Neystadt, R. Eric Fitzgerald, Leonid Verny
  • Patent number: 8954897
    Abstract: In a virtualization environment, a host machine on which a guest machine is operable is monitored to determine that it is healthy by being compliant with applicable policies (such as being up to date with the current security patches, running an anti-virus program, certified to run a guest machine, etc.) and free from malicious software or “malware” that could potentially disrupt or compromise the security of the guest machine. If the host machine is found to be non-compliant, then the guest machine is prevented from either booting up on the host machine or connecting to a network to ensure that the entire virtualization environment is compliant and that the guest machine, including its data and applications, etc., is protected against attacks that may be launched against it via malicious code that runs on the unhealthy host machine, or is isolated from the network until the non-compliancy is remediated.
    Type: Grant
    Filed: August 28, 2008
    Date of Patent: February 10, 2015
    Assignee: Microsoft Corporation
    Inventors: John Neystadt, Noam Ben-Yochanan, Nir Nice