Patents by Inventor Jon Bentley

Jon Bentley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7978831
    Abstract: Methods and apparatus are provided for defending against telephone-based robotic attacks. An interactive voice response method is disclosed, comprising the steps of obtaining a script to present to a caller, the script including at least one menu option having at least one personal code; generating a random number for the personal code; and presenting the at least one menu option with the generated random number to the caller. The step of generating a random number for the personal code is optionally responsive to receipt of the call. The method is optionally performed only if one or more predefined criteria defining an attack are satisfied. The disclosed IVR system can optionally monitor the caller response to determine whether the caller enters the generated random number.
    Type: Grant
    Filed: June 29, 2007
    Date of Patent: July 12, 2011
    Assignee: Avaya Inc.
    Inventors: Henry Baird, Jon Bentley, Daniel Lopresti, Sui-Yu Wang
  • Patent number: 7873995
    Abstract: A method and apparatus are provided for generating passwords that may be memorized by a user, yet not easily guessed by an attacker. A user is presented with one or more textual, audio or visual hints. A password is automatically generated based on the selected hint (and possibly further input from the user). The presented hints may include poems, songs, jokes, pictures or words. The generated password and selected hint can be presented to the user during enrollment for further reinforcement and stored in a user database for subsequent reinforcement and verification. The enrollment process may schedule the sending of one or more reminder messages to the user containing the hint to reinforce the password in the user's memory.
    Type: Grant
    Filed: September 29, 2003
    Date of Patent: January 18, 2011
    Assignee: Avaya Inc.
    Inventors: Amit Bagga, Jon Bentley, Lawrence O'Gorman
  • Publication number: 20090003549
    Abstract: Methods and apparatus are provided for defending against telephone-based robotic attacks An interactive voice response method is provided for presenting a menu having one or more menu options to a caller. The method comprises the steps of obtaining a script to present to the caller, the script including the one or more menu options; permuting one or more characteristics of at least one of the one or more menu options; and presenting the permuted menu to the caller. The permutation may comprise, for example, adding one or more additional menu options to the menu; varying a selection number associated with the at least one menu option; varying an order of at least a plurality of the menu options; or varying a wording or pronunciation of one or more menu options.
    Type: Application
    Filed: June 29, 2007
    Publication date: January 1, 2009
    Inventors: Henry Baird, Jon Bentley, Daniel Lopresti, Sui-Yu Wang
  • Publication number: 20090003539
    Abstract: Methods and apparatus are provided for defending against telephone-based robotic attacks. An interactive voice response method is disclosed, comprising the steps of obtaining a script to present to a caller, the script including at least one menu option having at least one personal code; generating a random number for the personal code; and presenting the at least one menu option with the generated random number to the caller. The step of generating a random number for the personal code is optionally responsive to receipt of the call. The method is optionally performed only if one or more predefined criteria defining an attack are satisfied. The disclosed IVR system can optionally monitor the caller response to determine whether the caller enters the generated random number.
    Type: Application
    Filed: June 29, 2007
    Publication date: January 1, 2009
    Inventors: Henry Baird, Jon Bentley, Daniel Lopresti, Sui-Yu Wang
  • Publication number: 20090003548
    Abstract: Methods and apparatus are provided fox defending against telephone-based robotic attacks. An interactive voice response method is provided for presenting a menu having one or more menu options to a caller associated with a call. The method comprises the steps of obtaining a script to present to the caller, the script including the one or more menu options; combining at least one of the one or more menu options with a background audio signal, wherein the background audio signal is selected based on a context of the call; and presenting the combination of the at least one of the one or mole menu options and the background audio signal to the caller. The context of the call includes comprises one or more of an identity of a called party associated with the call and a time period of the call. The background audio signal can optionally be obtained from a library of background signals.
    Type: Application
    Filed: June 29, 2007
    Publication date: January 1, 2009
    Inventors: Henry Baird, Jon Bentley, Daniel Lopresti, Sui-Yu Wang
  • Publication number: 20080279343
    Abstract: A telephone of the corded or portable type includes a light source. The light source may or may not have an ability to be pivoted or swiveled to illuminate a desired portion of a room. In the case of a corded telephone, the light source may be detachable from the telephone. The light source may be automatically activated to provide emergency illumination when a power failure condition exists in a building. The light source may also be manually activated to provide a convenient illumination source for the user.
    Type: Application
    Filed: May 11, 2007
    Publication date: November 13, 2008
    Inventors: Jon Bentley, Anjur Sundaresan Krishnakumar, David M. Weiss
  • Publication number: 20080155520
    Abstract: Systems and methods for constructing and maintaining a peer-to-peer overlay graph are disclosed herein. The systems and methods include adding a node to the overlay graph. Adding the node includes choosing an edge that is not connected to the node, breaking the edge and connecting the node to broken edge nodes previously connected to the edge. The process is repeating if additional connections are need and node addition data is stored for the node.
    Type: Application
    Filed: October 26, 2006
    Publication date: June 26, 2008
    Applicant: AVAYA TECHNOLOGY LLC
    Inventors: Jean Meloche, Shalini Yajnik, P. Krishnan, Stanko Dimitrov, Colin L. Mallows, Jon Bentley
  • Publication number: 20060160816
    Abstract: Chemical compounds of formula (I): and pharmaceutically acceptable salts and addition compounds and prodrugs thereof are useful in therapy, particularly for the treatment of disorders of the central nervous system; damage to the central nervous system; cardiovascular disorders; gastrointestinal disorders; diabetes inspidus, and sleep apnea.
    Type: Application
    Filed: March 14, 2006
    Publication date: July 20, 2006
    Inventors: David Adams, Jon Bentley, James Davidson, Matthew Dunction, Richard Porter
  • Publication number: 20050114679
    Abstract: A method and apparatus are provided for extracting information from a user's memory that will be easily recalled during future authentication yet is hard for an attacker to guess. The information might be a little-known fact of personal relevance to the user or the personal details surrounding a public event. The user is guided to appropriate topics and forms an indirect hint that is useful to the user yet not to an attacker. Information extraction techniques verify that the information is not easily attacked and to estimate how many bits of assurance the question and answer provide. The information extracted may be, e.g., Boolean (Yes/No), multiple choice, numeric, textual, or a combination of the foregoing. The enrollment process may schedule the sending of one or more reminder messages to the user containing the question (but not the answer) to reinforce the memory of the user.
    Type: Application
    Filed: November 26, 2003
    Publication date: May 26, 2005
    Inventors: Amit Bagga, Jon Bentley, Lawrence O'Gorman
  • Publication number: 20050114678
    Abstract: A method and apparatus are provided for evaluating the security of authentication information that is extracted from a user. The disclosed authentication information security analysis techniques determine whether extracted authentication information can be obtained by an attacker. The extracted authentication information might be, for example, personal identification numbers (PINs), passwords and query based passwords (questions and answers). A disclosed authentication information security analysis process employs information extraction techniques to verify that the authentication information provided by a user is not easily obtained through an online search. The authentication information security analysis process measures the security of authentication information, such as query based passwords, provided by a user. Information extraction techniques are employed to find and report relations between the proposed password and certain user information that might make the proposed password vulnerable to attack.
    Type: Application
    Filed: March 31, 2004
    Publication date: May 26, 2005
    Inventors: Amit Bagga, Jon Bentley, Lawrence O'Gorman, Kiyoshi Sudo
  • Publication number: 20050071686
    Abstract: A method and apparatus are provided for generating passwords that may be memorized by a user, yet not easily guessed by an attacker. A user is presented with one or more textual, audio or visual hints. A password is automatically generated based on the selected hint (and possibly further input from the user). The presented hints may include poems, songs, jokes, pictures or words. The generated password and selected hint can be presented to the user during enrollment for further reinforcement and stored in a user database for subsequent reinforcement and verification. The enrollment process may schedule the sending of one or more reminder messages to the user containing the hint to reinforce the password in the user's memory.
    Type: Application
    Filed: September 29, 2003
    Publication date: March 31, 2005
    Inventors: Amit Bagga, Jon Bentley, Lawrence O'Gorman
  • Publication number: 20050039056
    Abstract: A three party authenticating protocol is disclosed. During an enrollment phase, a user contacts a call center and is directed to a user verification server. The user verification server instructs the user to select and answer a number of questions that will be used for verification. The selected questions along with identifying indices for each question are stored at the user's location and at the user verification server. The user verification server sends the question indices to the call center, which in turn sends these indices to the user to obtain answer indices for each question. During a verification phase, the user contacts the call center and an authentication module asks the user to provide an asserted identity. The authentication module provides a random selection of question indices from those selected by the user. The user provides answer indices for each question to the authentication module. If the number of correctly matching answers exceeds a threshold, then the user is verified.
    Type: Application
    Filed: July 24, 2003
    Publication date: February 17, 2005
    Inventors: Amit Bagga, Jon Bentley, Lawrence O'Gorman
  • Publication number: 20050039057
    Abstract: A query directed password scheme is disclosed that employs attack-resistant questions having answers that generally cannot be correlated with the user using online searching techniques, such as user opinions, trivial facts, or indirect facts. During an enrollment phase, the user is presented with a pool of questions from which the user must select a subset of such questions to answer. Information extraction techniques optionally ensure that the selected questions and answers cannot be correlated with the user. A security weight can optionally be assigned to each selected question. The selected questions should optionally meet predefined criteria for topic distribution. During a verification phase, the user is challenged with a random subset of the questions that the user has previously answered and answers these questions until a level of security for a given application is exceeded as measured by the number of correct questions out of the number of questions asked.
    Type: Application
    Filed: July 24, 2003
    Publication date: February 17, 2005
    Inventors: Amit Bagga, Jon Bentley, Lawrence O'Gorman
  • Patent number: 6831078
    Abstract: A compound of formula (1) wherein R1 is aryl; and R2 is hydrogen or alkyl; pharmaceutically acceptable addition compounds thereof; and their use in therapy, particularly for the treatment and prophylaxis of CNS disorders such as anxiety and epilepsy.
    Type: Grant
    Filed: February 12, 2001
    Date of Patent: December 14, 2004
    Assignee: Vernalis Research Limited
    Inventors: David Reginald Adams, Jon Bentley, Corinna Dagmar Bodkin, Ian Anthony Cliffe, James Edward Paul Davidson, Howard Langham Mansell, Nathaniel Julius Monck, Robin Gerald Shepherd, by Joy Miriam Shepherd