Patents by Inventor Jonathan David Ruggiero

Jonathan David Ruggiero has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190306151
    Abstract: A system for credential authentication comprises an interface configured to receive a create indication to create a visitor network credential and receive a certify indication to certify an authentication device to use a network, and a processor configured to provide the visitor network credential to the authentication device in response to the certify indication, provide a proof request to the authentication device, receive a proof response, validate the proof response using a distributed ledger, generate a network certificate, and provide the network certificate to the authentication device.
    Type: Application
    Filed: March 26, 2019
    Publication date: October 3, 2019
    Inventors: Bjorn Hamel, Jonathan David Ruggiero
  • Publication number: 20190303559
    Abstract: A system for providing an application includes an interface and a processor. The interface is configured to receive an indication to provide an application to a device. The processor is configured to provide the application to the device. The application is configured to receive a request for credentialed information associated with a user from a requesting server; determine whether a stored credential satisfies the request for the credentialed information; and in response to a determination that the stored credential satisfies the request for the credentialed information: determine a response credential for responding to the request; determine that the user approves sharing the credentialed information indicated by the response credential; and provide the response credential to the requesting server.
    Type: Application
    Filed: June 28, 2018
    Publication date: October 3, 2019
    Inventors: Bjorn Hamel, Jonathan David Ruggiero
  • Publication number: 20190305952
    Abstract: A system for creating an identity mapping on a distributed ledger includes an interface and a processor. The interface is configured to receive a request to create an identity mapping on a distributed ledger. The processor is configured to generate an identity key pair; generate a mobile encryption key; encrypt a private identity key of the identity key pair using the mobile encryption key to create an encrypted private key; store the encrypted private key; create a mapping document; sign the mapping document with the private identity key of the identity key pair; and provide the signed mapping document to be stored in a distributed ledger.
    Type: Application
    Filed: March 26, 2019
    Publication date: October 3, 2019
    Inventors: Bjorn Hamel, Jonathan David Ruggiero
  • Publication number: 20190306143
    Abstract: The system for providing an application includes an interface and a processor. The interface is configured to receive a providing indication to provide the application to a device. The processor is configured to provide the application to the device. The application is configured to receive login information associated with a user; receive an adding indication to add a credential; provide an available indication of credentials available to the user; create a credential request; provide the credential request to a server system; receive the credential; and store the credential.
    Type: Application
    Filed: June 28, 2018
    Publication date: October 3, 2019
    Inventors: Bjorn Hamel, Jonathan David Ruggiero
  • Publication number: 20190303587
    Abstract: A system for providing access is configured to receive an application access request from an application for authorization to access and a sensitive data access request from the application for authorization to access a document that includes sensitive data. The system is further configured to determine to authorize access to the application in response to the application access request; to determine the user authentication device in response to the sensitive data access request; to provide a secondary request for authorization to access sensitive data to the user authentication device in response to the sensitive data access request, receive a secondary request response from the user authentication device to the secondary request; and to provide the secondary request response to the application enabling access to the sensitive data, where the document is encrypted for delivery to the application for the user using a blinding secret and an identity private key.
    Type: Application
    Filed: March 26, 2019
    Publication date: October 3, 2019
    Inventors: Bjorn Hamel, Jonathan David Ruggiero
  • Publication number: 20190260579
    Abstract: A system for secure retrieval of stored data includes an encrypted key database and a processor. The encrypted key database is configured to store an encrypted tenant service key and an encrypted tenant master key. The processor is configured to request decryption of the encrypted tenant master key into an unencrypted tenant master key. The decryption of the encrypted master key is approved by a key release system. The processor is further configured to decrypt the encrypted tenant service key using the unencrypted tenant master key into an unencrypted tenant service key and authorize a response to a request using the unencrypted tenant service key.
    Type: Application
    Filed: November 15, 2018
    Publication date: August 22, 2019
    Inventors: Bjorn Hamel, Jonathan David Ruggiero
  • Publication number: 20190253244
    Abstract: A system for secure storage of data includes a key database and a processor. The processor is configured to receive a request associated with securely storing data and encrypt the tenant service key using a tenant master key. The data is encrypted using the tenant service key. The processor is further configured to encrypt the tenant master key using a customer key and store encrypted tenant service key and encrypted tenant master key in the key database.
    Type: Application
    Filed: October 24, 2018
    Publication date: August 15, 2019
    Inventors: Bjorn Hamel, Jonathan David Ruggiero
  • Publication number: 20190138744
    Abstract: A system for accessing data includes and interface and a processor. The interface is configured to receive a request to move stored data to a new location and requestor information. The stored data comprises sensitive data. The processor is configured to determine whether read access, storage access, and deletion access are allowed based at least in part on the requestor information; in the event that read access, storage access, and deletion access are allowed: read the sensitive data at an original location using an original token, store the sensitive data to the new location and receive a new token associated with the new location, and delete the original token and the sensitive data at the original location.
    Type: Application
    Filed: November 1, 2018
    Publication date: May 9, 2019
    Inventors: Jonathan David Ruggiero, Bjorn Hamel, Darius Kasad
  • Patent number: 10241693
    Abstract: A system for dynamically utilizing data storage comprises a processor and a memory. The processor is configured to determine whether a data storage criterion is satisfied; and, in the event that the data storage criterion is satisfied: determine a new archiving threshold based on a target data storage usage level; and set the archiving threshold. The memory is coupled to the processor and is configured to provide the processor with instructions.
    Type: Grant
    Filed: October 17, 2016
    Date of Patent: March 26, 2019
    Assignee: Workday, Inc.
    Inventors: Peter George Hendry, Jonathan David Ruggiero
  • Patent number: 10204237
    Abstract: A system for accessing data includes an interface and a processor. The interface is to receive a request to access data and requestor information. The processor is to determine whether the data comprises sensitive data configured to have an assigned access policy and an assigned storage policy; and in the event that the data comprises sensitive data configured to have the assigned access policy and the assigned storage policy, determine whether access is allowed based at least in part on the requestor information; and in the event that access is allowed, retrieve the data based on information provided by a token and provide the data.
    Type: Grant
    Filed: July 1, 2016
    Date of Patent: February 12, 2019
    Assignee: Workday, Inc.
    Inventors: Jonathan David Ruggiero, Bjorn Hamel, Darius Kasad
  • Patent number: 10198470
    Abstract: A system for executing an embedded intelligence process comprises an interface and a processor. The interface is for receiving an input object for a process associated with an embedded intelligence applet. The processor is for searching a database for a set of objects. The set of objects is based at least in part on the input object. The processor is for determining display information for the embedded intelligence applet based at least in part on the set of objects.
    Type: Grant
    Filed: July 1, 2016
    Date of Patent: February 5, 2019
    Assignee: Workday, Inc.
    Inventors: Jonathan David Ruggiero, Paul Gustafson, Bruce Shay, Nick Pouschine
  • Patent number: 10187203
    Abstract: A system for secure storage of data includes a key database and a processor. The processor is configured to receive a request associated with securely storing data and encrypt the tenant service key using a tenant master key. The data is encrypted using the tenant service key. The processor is further configured to encrypt the tenant master key using a customer key and store encrypted tenant service key and encrypted tenant master key in the key database.
    Type: Grant
    Filed: August 30, 2016
    Date of Patent: January 22, 2019
    Assignee: Workday, Inc.
    Inventors: Bjorn Hamel, Jonathan David Ruggiero
  • Patent number: 10177908
    Abstract: A system for secure retrieval of stored data includes an encrypted key database and a processor. The encrypted key database is configured to store an encrypted tenant service key and an encrypted tenant master key. The processor is configured to request decryption of the encrypted tenant master key into an unencrypted tenant master key. The decryption of the encrypted master key is approved by a key release system. The processor is further configured to decrypt the encrypted tenant service key using the unencrypted tenant master key into an unencrypted tenant service key and authorize a response to a request using the unencrypted tenant service key.
    Type: Grant
    Filed: August 30, 2016
    Date of Patent: January 8, 2019
    Assignee: Workday, Inc.
    Inventors: Bjorn Hamel, Jonathan David Ruggiero
  • Patent number: 10162529
    Abstract: A system for dynamically utilizing data storage comprises a processor and a memory. The processor is configured to determine whether a data storage criterion is satisfied; and, in the event that the data storage criterion is satisfied: determine a new archiving threshold based on a target data storage usage level; and set the archiving threshold. The memory is coupled to the processor and is configured to provide the processor with instructions.
    Type: Grant
    Filed: May 12, 2016
    Date of Patent: December 25, 2018
    Assignee: Workday, Inc.
    Inventors: Peter George Hendry, Jonathan David Ruggiero
  • Patent number: 10152610
    Abstract: A system for accessing data includes an interface and a processor. The interface is to receive a request to access data and requestor information. The processor is to determine whether the data comprises sensitive data configured to have an assigned access policy and an assigned storage policy; and in the event that the data comprises sensitive data configured to have the assigned access policy and the assigned storage policy, determine whether access is allowed based at least in part on the requestor information; and in the event that access is allowed, retrieve the data based on information provided by a token and provide the data.
    Type: Grant
    Filed: July 1, 2016
    Date of Patent: December 11, 2018
    Assignee: Workday, Inc.
    Inventors: Jonathan David Ruggiero, Bjorn Hamel, Darius Kasad
  • Publication number: 20180336239
    Abstract: A system for database updating includes a database, a spreadsheet storage of a spreadsheet for planning, an interface, and a processor. The spreadsheet storage is separate from the database. The interface is configured to receive an indication to modify the spreadsheet. The processor is configured to store a modification in the spreadsheet storage based at least in part on the indication, determine one or more objects to change in the database based at least in part on the indication, and cause change to the one or more objects in the database.
    Type: Application
    Filed: May 22, 2017
    Publication date: November 22, 2018
    Inventors: Wendy Yang, Dylan Owen, Kevin Chan, Jonathan David Ruggiero, Daniel G. Rabe, Sayan Chakraborty
  • Publication number: 20180336174
    Abstract: A system for data transformation includes a database, a spreadsheet storage of a spreadsheet for planning, an interface, and a processor. The spreadsheet storage is separate from the database. The interface is configured to receive a database datum associated with a large time period. The processor is configured to generate a plurality of spreadsheet data based at least in part on the database datum. Each spreadsheet datum is associated with one of a set of small time periods. The plurality of spreadsheet data is stored in the spreadsheet storage. The spreadsheet storage is separate from the database. The processor is configured to provide the plurality of spreadsheet data for display in the spreadsheet.
    Type: Application
    Filed: May 22, 2017
    Publication date: November 22, 2018
    Inventors: Wendy Yang, Dylan Owen, Kevin Chan, Jonathan David Ruggiero, Daniel G. Rabe, Sayan Chakraborty
  • Patent number: 10083060
    Abstract: A system for processing a batch job comprises a processor and a memory. The processor is configured to receive a batch job comprising a sequential or parallel flow of operations, wherein each operation has a defined input type and a defined output type. The processor is further configured to verify that the batch job can run successfully, wherein verifying includes checking that a first operation output defined type is compatible with a second operation input defined type when a first operation output is connected to a second operation input, and wherein verifying includes checking that a parameter used by a calculation in an operation is input to the operation. The memory is coupled to the processor and configured to provide the processor with instructions.
    Type: Grant
    Filed: November 20, 2014
    Date of Patent: September 25, 2018
    Assignee: Workday, Inc.
    Inventors: Jonathan David Ruggiero, Salvador Maiorano Quiroga, Kevin Chan, Christopher Speer
  • Publication number: 20180062835
    Abstract: A system for secure storage of data includes a key database and a processor. The processor is configured to receive a request associated with securely storing data and encrypt the tenant service key using a tenant master key. The data is encrypted using the tenant service key. The processor is further configured to encrypt the tenant master key using a customer key and store encrypted tenant service key and encrypted tenant master key in the key database.
    Type: Application
    Filed: August 30, 2016
    Publication date: March 1, 2018
    Inventors: Bjorn Hamel, Jonathan David Ruggiero
  • Publication number: 20180060600
    Abstract: A system for secure retrieval of stored data includes an encrypted key database and a processor. The encrypted key database is configured to store an encrypted tenant service key and an encrypted tenant master key. The processor is configured to request decryption of the encrypted tenant master key into an unencrypted tenant master key. The decryption of the encrypted master key is approved by a key release system. The processor is further configured to decrypt the encrypted tenant service key using the unencrypted tenant master key into an unencrypted tenant service key and authorize a response to a request using the unencrypted tenant service key.
    Type: Application
    Filed: August 30, 2016
    Publication date: March 1, 2018
    Inventors: Bjorn Hamel, Jonathan David Ruggiero