Patents by Inventor John Neystadt
John Neystadt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200053129Abstract: Among other things, this document describes systems, methods and devices for discovering and identifying client devices that attempt to access out-of-policy network services via a secure web gateway (or other network security gateway) that lacks visibility into the client network actual IP space. This is a common problem with cloud hosted SWG services that enforce access policy from outside of a customer network (e.g., external to an enterprise network), due to network address translation at the interface between the customer network and the public Internet where the cloud-hosted SWG resides. The teachings hereof address this problem. In one embodiment, a cloud hosted SWG can redirect a client to a bouncer device inside the customer network; that bouncer device can capture the actual client IP address.Type: ApplicationFiled: August 13, 2018Publication date: February 13, 2020Applicant: Akamai Technologies, Inc.Inventors: Eugene (John) Neystadt, Michael Graham, John Devasia
-
Patent number: 10362617Abstract: A method and a system for accessing through a second mobile telecommunication network to services offered by a first mobile telecommunication network comprising the steps of: establishing a first communication channel with the second network, based on a secondary SIM card; establishing a second communication channel with the first network using the first communication channel, wherein a user of the mobile communication device is authenticated using a primary SIM card; registering, through the second communication channel, the user of the mobile communication device into the first network using the information stored in the primary SIM card; and accessing from the mobile communication device to services offered by the first network through the second communication channel.Type: GrantFiled: October 11, 2017Date of Patent: July 23, 2019Assignee: TELEFONICA DIGITAL ESPAÑAInventors: Jorge Serna, John Neystadt, David Gallegos
-
Patent number: 10349274Abstract: Aspects of the subject matter described herein relate to a simplified login for mobile devices. In aspects, on a first logon, a mobile device asks a user to enter credentials and a PIN. The credentials and PIN are sent to a server which validates user credentials. If the user credentials are valid, the server encrypts data that includes at least the user credentials and the PIN and sends the encrypted data to the mobile device. In subsequent logons, the user may logon using only the PIN. During login, the mobile device sends the PIN in conjunction with the encrypted data. The server can then decrypt the data and compare the received PIN with the decrypted PIN. If the PINs are equal, the server may grant access to a resource according to the credentials.Type: GrantFiled: November 27, 2017Date of Patent: July 9, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Meir Mendelovich, John Neystadt, Ken Aoyama, Nir Nice, Shay Yehuda Gurman
-
Patent number: 10116580Abstract: Described is a technology by which a seamless automatic connection to an (e.g., corporate) network is made for a client device. Upon detecting a need for a connection to a network, such as by intercepting a communication directed towards a network destination, a list of available connection methods is automatically obtained based on the device's current location data (e.g., LAN or remote) and policy information. An available connection method from the list is selected, e.g., in order, and an attempt is made to establish a connection via that connection method. If the attempt fails, another attempt is made with a different connection method, and so on, until a connection method succeeds. Additional seamlessness from the user's perspective is provided via a credentials vault, by which stored credentials may be retrieved and used in association with the access method being attempted.Type: GrantFiled: June 27, 2008Date of Patent: October 30, 2018Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Ehud Mordechai Itshaki, Nir Nice, Eugene John Neystadt, Noam Gershon Ben-Yochanan
-
Publication number: 20180110081Abstract: A method and a system for accessing through a second mobile telecommunication network to services offered by a first mobile telecommunication network comprising the steps of establishing a first communication channel with the second network, based on a secondary SIM card; establishing a second communication channel with the first network using the first communication channel, wherein a user of the mobile communication device is authenticated using a primary SIM card; registering, through the second communication channel, the user of the mobile communication device into the first network using the information stored in the primary SIM card; and accessing from the mobile communication device to services offered by the first network through the second communication channel.Type: ApplicationFiled: October 11, 2017Publication date: April 19, 2018Inventors: JORGE SERNA, JOHN NEYSTADT, DAVID GALLEGOS
-
Publication number: 20180084422Abstract: Aspects of the subject matter described herein relate to a simplified login for mobile devices. In aspects, on a first logon, a mobile device asks a user to enter credentials and a PIN. The credentials and PIN are sent to a server which validates user credentials. If the user credentials are valid, the server encrypts data that includes at least the user credentials and the PIN and sends the encrypted data to the mobile device. In subsequent logons, the user may logon using only the PIN. During login, the mobile device sends the PIN in conjunction with the encrypted data. The server can then decrypt the data and compare the received PIN with the decrypted PIN. If the PINs are equal, the server may grant access to a resource according to the credentials.Type: ApplicationFiled: November 27, 2017Publication date: March 22, 2018Inventors: Meir Mendelovich, John Neystadt, Ken Aoyama, Nir Nice, Shay Yehuda Gurman
-
Patent number: 9870424Abstract: A ranked set of users may be calculated from an expertise categorization for each user and a person's trust in the users for specific categories. The ranked set of users may be used for presenting search results, recommendations, social marketing, or other uses. A person's reputation may be determined through various online activities. A person's trust in another person may be related to their proximity and activity in one or more social networks.Type: GrantFiled: March 8, 2011Date of Patent: January 16, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Eugene (John) Neystadt, Ron Karidi, Yitzhak Tzahi Weisfeild, Roy Varshavsky, Avigad Oron, Kira Radinsky
-
Patent number: 9832642Abstract: Aspects of the subject matter described herein relate to a simplified login for mobile devices. In aspects, on a first logon, a mobile device asks a user to enter credentials and a PIN. The credentials and PIN are sent to a server which validates user credentials. If the user credentials are valid, the server encrypts data that includes at least the user credentials and the PIN and sends the encrypted data to the mobile device. In subsequent logons, the user may logon using only the PIN. During login, the mobile device sends the PIN in conjunction with the encrypted data. The server can then decrypt the data and compare the received PIN with the decrypted PIN. If the PINs are equal, the server may grant access to a resource according to the credentials.Type: GrantFiled: October 5, 2015Date of Patent: November 28, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Meir Mendelovich, John Neystadt, Ken Aoyama, Nir Nice, Shay Yehuda Gurman
-
Patent number: 9633110Abstract: Methods, systems, and computer program products are provided for automatically enriching data in tables of report documents. A table of data contained in a document is received. A category of data stored in a column of the table of data is determined Enhancement information associated with the determined category is retrieved. The enhancement information may include visual enhancements (e.g., symbols, images, etc.) and/or may include reference data that is related to the determined category of column data. A user is enabled to select enhancement information of the retrieved enhancement information. The selected enhancement information is displayed in the document. The user is enabled to accept the selected enhancement information to be stored in the document.Type: GrantFiled: November 15, 2011Date of Patent: April 25, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Meir Mendelovich, Eugene (John) Neystadt, Dany Hoter
-
Patent number: 9344432Abstract: Embodiments of the invention provide techniques for basing access control decisions at the network layer at least in part on information provided in claims, which may describe attributes of a computer requesting access, one or more resources to which access is requested, the user, the circumstances surrounding the requested access, and/or other information. The information may be evaluated based on one or more access control policies, which may be pre-set or dynamically generated, and used in making a decision whether to grant or deny the computer access to the specified resource(s).Type: GrantFiled: June 24, 2010Date of Patent: May 17, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Yair Tor, Daniel Rose, Eugene (John) Neystadt, Patrik Schnell, Moshe Sapir, Oleg Ananiev, Arthur Zavalkovsky, Anat Eyal
-
Publication number: 20160037343Abstract: Aspects of the subject matter described herein relate to a simplified login for mobile devices. In aspects, on a first logon, a mobile device asks a user to enter credentials and a PIN. The credentials and PIN are sent to a server which validates user credentials. If the user credentials are valid, the server encrypts data that includes at least the user credentials and the PIN and sends the encrypted data to the mobile device. In subsequent logons, the user may logon using only the PIN. During login, the mobile device sends the PIN in conjunction with the encrypted data. The server can then decrypt the data and compare the received PIN with the decrypted PIN. If the PINs are equal, the server may grant access to a resource according to the credentials.Type: ApplicationFiled: October 5, 2015Publication date: February 4, 2016Inventors: Meir Mendelovich, John Neystadt, Ken Aoyama, Nir Nice, Shay Yehuda Gurman
-
Patent number: 9154505Abstract: Aspects of the subject matter described herein relate to a simplified login for mobile devices. In aspects, on a first logon, a mobile device asks a user to enter credentials and a PIN. The credentials and PIN are sent to a server which validates user credentials. If the user credentials are valid, the server encrypts data that includes at least the user credentials and the PIN and sends the encrypted data to the mobile device. In subsequent logons, the user may logon using only the PIN. During login, the mobile device sends the PIN in conjunction with the encrypted data. The server can then decrypt the data and compare the received PIN with the decrypted PIN. If the PINs are equal, the server may grant access to a resource according to the credentials.Type: GrantFiled: January 13, 2014Date of Patent: October 6, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Meir Mendelovich, John Neystadt, Ken Aoyama, Nir Nice, Shay Yehuda Gurman
-
Publication number: 20150269627Abstract: A user-profiling method for providing advertisement data and/or online content to a user and a computer program. In the user-profiling method a user provided with a computing device maintains a voice and/or a video communication with a second user through a communications provider, the method comprising: receiving a profiling engine said voice and/or said video communication from said communications provider as an input; processing said profiling engine, by means of an algorithm, a plurality of keywords related to data identifying a plurality of profiling parameters obtained from said voice or said video communication in order to obtain a user profile, and providing data advertisement and/or online content to said user on the basis of said obtained user profile.Type: ApplicationFiled: October 18, 2013Publication date: September 24, 2015Applicants: JAJAH LTD., TELEFONICA, S.A.Inventors: Diego Urdiales Delgado, Nick Mullen, John Neystadt
-
Patent number: 9111079Abstract: Embodiments of the invention make the issuance of trustworthy device claims available to client devices as a service, so that a client device to which device claims are issued may use the device claims in relation to an attempt to access a network application. The service may conduct an assessment of the device's characteristics and/or state, characterize the results of this assessment in device claims, and issue the device claims to the device. The service may be accessible to a client device from outside administrative boundaries of an entity that makes a network application accessible, and thus may be useful to entities making network applications accessible in business-to-consumer (B2C) and business-to-business (B2B) topologies, such as over the publicly accessible Internet.Type: GrantFiled: January 27, 2011Date of Patent: August 18, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Eugene (John) Neystadt, Daniel Alon, Yair Tor, Mark Novak, Khaja E. Ahmed, Yoav Yassour
-
Publication number: 20150189004Abstract: The method comprises creating a single point in a communication flow, by a first farm load balancer, that both communication sessions requested by a client server A and a client server B at a network layer will pass through; creating stickiness based on said communication session requests and creates a bi-directional affinity by correlating the communication session requests of different sessions and maintaining a correlation mapping.Type: ApplicationFiled: December 23, 2014Publication date: July 2, 2015Applicant: TELEFONICA DIGITAL ESPANA, S.L.U.Inventors: Alex MASSOVER, John NEYSTADT
-
Patent number: 9055107Abstract: The method of delegating authentication, within a chain of entities, relies upon a recording of at least a portion of a TLS handshake between a gateway device and user, in which the user needs access to a desired server. The method then relies upon re-verification of cryptographic evidence in the recorded portion of the TLS handshake, which is forwarded either (1) to the server to which access is desired, in which case the server re-verifies the recorded portion to confirm authentication, or, (2) to a third party entity, in which case the third party entity confirms authentication and provides credentials to the gateway server which then uses the credentials to authenticate to the server as the user.Type: GrantFiled: December 1, 2006Date of Patent: June 9, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Gennady Medvinsky, Nir Nice, Tomer Shiran, Alexander Teplitsky, Paul Leach, John Neystadt
-
Patent number: 9049262Abstract: A method and system for combined Peer-to-Peer (P2P) conferencing and central relay server-based conferencing using a telephony and conferencing protocol that includes Web Real-Time Communication (WebRTC) or Session Initiation Protocol (SIP), including receiving by a central relay server a request from a client device to participate in a conference call, comparing by the central relay server a received client device policy and a central relay server policy for selecting at least one of the P2P conferencing or the central relay server-based conferencing, and selecting at least one suggested connection mode for the client device based on a result of the comparing of the received client device policy and the central relay server policy, the combined P2P conferencing and central relay server-based conferencing including mixing server-based conferencing streams and P2P conferencing streams.Type: GrantFiled: February 21, 2014Date of Patent: June 2, 2015Assignee: TELEFONICA DIGITAL ESPAÑA, S.L.U.Inventors: Alex Massover, Gustavo Garcia, John Neystadt
-
Patent number: 8997196Abstract: Systems, methods and apparatus for accessing at least one resource hosted by at least one server of a cloud service provider. In some embodiments, a client computer sends authentication information associated with a user of the client computer and a statement of health regarding the client computer to an access control gateway deployed in an enterprise's managed network. The access control gateway authenticates the user and determines whether the user is authorized to access the at least one resource hosted in the cloud. If the user authentication and authorization succeeds, the access control gateway requests a security token from a security token service trusted by an access control component in the cloud and forwards the security token to the client computer. The client computer sends the security token to the access component in the cloud to access the at least one resource from the at least one server.Type: GrantFiled: June 14, 2010Date of Patent: March 31, 2015Assignee: Microsoft CorporationInventors: Asaf Kariv, Oleg Ananiev, Eli Tovbeyn, Daniel Kershaw, Eugene (John) Neystadt
-
Patent number: 8955108Abstract: A security system collects an audit trail on a computer outside of a boundary created by one or more virtual machines. The security system uses a privileged virtual machine to collect audit logs for each protected virtual machine. As the protected virtual machines run, they send auditing information to the privileged virtual machine. The privileged virtual machine can collect auditing information from protected virtual machines much more quickly than a network server, as well as collecting auditing events from multiple protected virtual machines. Because the auditing destination is located on the same computer as the virtual machine monitored by the audit trail, no network dependency is present. Thus, the security system allows for monitoring the activity of administrators and other users while preventing tampering with the audit trail of each user's actions.Type: GrantFiled: June 17, 2009Date of Patent: February 10, 2015Assignee: Microsoft CorporationInventors: John Neystadt, R. Eric Fitzgerald, Leonid Verny
-
Patent number: 8954897Abstract: In a virtualization environment, a host machine on which a guest machine is operable is monitored to determine that it is healthy by being compliant with applicable policies (such as being up to date with the current security patches, running an anti-virus program, certified to run a guest machine, etc.) and free from malicious software or “malware” that could potentially disrupt or compromise the security of the guest machine. If the host machine is found to be non-compliant, then the guest machine is prevented from either booting up on the host machine or connecting to a network to ensure that the entire virtualization environment is compliant and that the guest machine, including its data and applications, etc., is protected against attacks that may be launched against it via malicious code that runs on the unhealthy host machine, or is isolated from the network until the non-compliancy is remediated.Type: GrantFiled: August 28, 2008Date of Patent: February 10, 2015Assignee: Microsoft CorporationInventors: John Neystadt, Noam Ben-Yochanan, Nir Nice