Patents by Inventor Kenneth Ives-Halperin
Kenneth Ives-Halperin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10650625Abstract: Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.Type: GrantFiled: June 25, 2018Date of Patent: May 12, 2020Assignee: Live Nation Entertainment, Inc.Inventors: Kenneth Ives-Halperin, Harry C. Evans, David Johnson, Scott Wall, David Lilly, Ajay Pondicherry
-
Patent number: 10560455Abstract: Authentication systems and methods can selectively authenticate a request to access a resource data store storing access rights associated with a user device. The systems and methods can scalably execute challenges workflows as part of the authentication process. For example, a request to access one or more access rights stored in the data store can be received from the user device. The user device can be authenticated using challenge workflows selected based on a device identifier of the user device. The selected challenge workflows can be executed to determine whether or not to grant access to the access rights stored in the resource data store.Type: GrantFiled: January 18, 2019Date of Patent: February 11, 2020Assignee: Live Nation Entertainment, Inc.Inventors: Dan Cernoch, Ajay Pondicherry, David Refsland, Kenneth Ives-Halperin
-
Publication number: 20190379743Abstract: Systems and methods for selecting tiering protocols based on data transmissions over mesh networks within defined spatial areas can be provided. A mesh network can be established within a defined spatial area. Each network device within the mesh network can be a user device or a supernode. Further, a wireless communication link can be established between the user devices and supernodes. A plurality of tiered protocols for tiering data transmissions can be accessed. Data to be transmitted over the mesh network can be analyzed to determine which tiered protocol to select. Path data that identifies a routing path from the a user device to a supernode can be generated, and the data can be transmitted according to the path data.Type: ApplicationFiled: August 21, 2019Publication date: December 12, 2019Inventors: Kenneth Ives-Halperin, Jeffrey Kelsey, Jon Flanders, Yen Hoang
-
Publication number: 20190273741Abstract: A resource-access management system detects whether a user is authorized to access resources. The system may include a user device being configured to include a sensor that detects sensor data associated with the user. Further, the system includes a client qualification engine that determines whether or not a client is authorized to access the resources by comparing the sensor data with a plurality of patterns for evaluating whether or not the user is an authorized user. User scores are generated based on the compared sensor data and the plurality of patterns. Further, a composite score corresponding to the user is generated using the sensor data, plurality of patterns, and one or more additional criteria. Whether the user is granted access to the resources, presented with unauthorized user tests, or blocked from access to the resources depends on the composite score and threshold values.Type: ApplicationFiled: March 11, 2019Publication date: September 5, 2019Inventors: Fengpei Du, Michael Lane, Kenneth Ives-Halperin
-
Patent number: 10397335Abstract: Systems and methods for selecting tiering protocols based on data transmissions over mesh networks within defined spatial areas can be provided. A mesh network can be established within a defined spatial area. Each network device within the mesh network can be a user device or a supernode. Further, a wireless communication link can be established between the user devices and supernodes. A plurality of tiered protocols for tiering data transmissions can be accessed. Data to be transmitted over the mesh network can be analyzed to determine which tiered protocol to select. Path data that identifies a routing path from the a user device to a supernode can be generated, and the data can be transmitted according to the path data.Type: GrantFiled: August 7, 2017Date of Patent: August 27, 2019Assignee: Live Nation Entertainment, Inc.Inventors: Kenneth Ives-Halperin, Jeffrey Kelsey, Jon Flanders, Yen Hoang
-
Publication number: 20190230082Abstract: Authentication systems and methods can selectively authenticate a request to access a resource data store storing access rights associated with a user device. The systems and methods can scalably execute challenges workflows as part of the authentication process. For example, a request to access one or more access rights stored in the data store can be received from the user device. The user device can be authenticated using challenge workflows selected based on a device identifier of the user device. The selected challenge workflows can be executed to determine whether or not to grant access to the access rights stored in the resource data store.Type: ApplicationFiled: January 18, 2019Publication date: July 25, 2019Inventors: Dan Cernoch, Ajay Pondicherry, David Refsland, Kenneth Ives-Halperin
-
Patent number: 10230729Abstract: A resource-access management system detects whether a user is authorized to access resources. The system may include a user device being configured to include a sensor that detects sensor data associated with the user. Further, the system includes a client qualification engine that determines whether or not a client is authorized to access the resources by comparing the sensor data with a plurality of patterns for evaluating whether or not the user is an authorized user. User scores are generated based on the compared sensor data and the plurality of patterns. Further, a composite score corresponding to the user is generated using the sensor data, plurality of patterns, and one or more additional criteria. Whether the user is granted access to the resources, presented with unauthorized user tests, or blocked from access to the resources depends on the composite score and threshold values.Type: GrantFiled: December 4, 2017Date of Patent: March 12, 2019Assignee: Live Nation Entertainment, Inc.Inventors: Fengpei Du, Michael Lane, Kenneth Ives-Halperin
-
Publication number: 20190073845Abstract: Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.Type: ApplicationFiled: June 25, 2018Publication date: March 7, 2019Inventors: Kenneth Ives-Halperin, Harry C. Evans, David Johnson, Scott Wall, David Lilly, Ajay Pondicherry
-
Patent number: 10187390Abstract: Authentication systems and methods can selectively authenticate a request to access a resource data store storing access rights associated with a user device. The systems and methods can scalably execute challenges workflows as part of the authentication process. For example, a request to access one or more access rights stored in the data store can be received from the user device. The user device can be authenticated using challenge workflows selected based on a device identifier of the user device. The selected challenge workflows can be executed to determine whether or not to grant access to the access rights stored in the resource data store.Type: GrantFiled: November 13, 2017Date of Patent: January 22, 2019Assignee: Live Nation Entertainment, Inc.Inventors: Dan Cernoch, Ajay Pondicherry, David Refsland, Kenneth Ives-Halperin
-
Patent number: 10008057Abstract: Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.Type: GrantFiled: November 24, 2015Date of Patent: June 26, 2018Assignee: Live Nation Entertainment, Inc.Inventors: Kenneth Ives-Halperin, Harry C. Evans, III, David Johnson, Scott Wall, David Lilly, Ajay Pondicherry
-
Publication number: 20180091513Abstract: A resource-access management system detects whether a user is authorized to access resources. The system may include a user device being configured to include a sensor that detects sensor data associated with the user. Further, the system includes a client qualification engine that determines whether or not a client is authorized to access the resources by comparing the sensor data with a plurality of patterns for evaluating whether or not the user is an authorized user. User scores are generated based on the compared sensor data and the plurality of patterns. Further, a composite score corresponding to the user is generated using the sensor data, plurality of patterns, and one or more additional criteria. Whether the user is granted access to the resources, presented with unauthorized user tests, or blocked from access to the resources depends on the composite score and threshold values.Type: ApplicationFiled: December 4, 2017Publication date: March 29, 2018Inventors: Fengpei Du, Michael Lane, Kenneth Ives-Halperin
-
Publication number: 20180069864Abstract: Authentication systems and methods can selectively authenticate a request to access a resource data store storing access rights associated with a user device. The systems and methods can scalably execute challenges workflows as part of the authentication process. For example, a request to access one or more access rights stored in the data store can be received from the user device. The user device can be authenticated using challenge workflows selected based on a device identifier of the user device. The selected challenge workflows can be executed to determine whether or not to grant access to the access rights stored in the resource data store.Type: ApplicationFiled: November 13, 2017Publication date: March 8, 2018Inventors: Dan Cernoch, Ajay Pondicherry, David Refsland, Kenneth Ives-Halperin
-
Patent number: 9898881Abstract: Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.Type: GrantFiled: November 24, 2015Date of Patent: February 20, 2018Assignee: Live Nation Entertainment, Inc.Inventors: Kenneth Ives-Halperin, Harry C. Evans, III, David Johnson, Scott Wall, David Lilly, Ajay Pondicherry
-
Publication number: 20170359420Abstract: Systems and methods for selecting tiering protocols based on data transmissions over mesh networks within defined spatial areas can be provided. A mesh network can be established within a defined spatial area. Each network device within the mesh network can be a user device or a supernode. Further, a wireless communication link can be established between the user devices and supernodes. A plurality of tiered protocols for tiering data transmissions can be accessed. Data to be transmitted over the mesh network can be analyzed to determine which tiered protocol to select. Path data that identifies a routing path from the a user device to a supernode can be generated, and the data can be transmitted according to the path data.Type: ApplicationFiled: August 7, 2017Publication date: December 14, 2017Inventors: Kenneth Ives-Halperin, Jeffrey Kelsey, Jon Flanders, Yen Hoang
-
Patent number: 9838394Abstract: A resource-access management system detects whether a user is authorized to access resources. The system may include a user device being configured to include a sensor that detects sensor data associated with the user. Further, the system includes a client qualification engine that determines whether or not a client is authorized to access the resources by comparing the sensor data with a plurality of patterns for evaluating whether or not the user is an authorized user. User scores are generated based on the compared sensor data and the plurality of patterns. Further, a composite score corresponding to the user is generated using the sensor data, plurality of patterns, and one or more additional criteria. Whether the user is granted access to the resources, presented with unauthorized user tests, or blocked from access to the resources depends on the composite score and threshold values.Type: GrantFiled: January 19, 2017Date of Patent: December 5, 2017Assignee: Live Nation Entertainment, Inc.Inventors: Fengpei Du, Michael Lane, Kenneth Ives-Halperin
-
Patent number: 9819684Abstract: Authentication systems and methods can selectively authenticate a request to access a resource data store storing access rights associated with a user device. The systems and methods can scalably execute challenges workflows as part of the authentication process. For example, a request to access one or more access rights stored in the data store can be received from the user device. The user device can be authenticated using challenge workflows selected based on a device identifier of the user device. The selected challenge workflows can be executed to determine whether or not to grant access to the access rights stored in the resource data store.Type: GrantFiled: December 2, 2016Date of Patent: November 14, 2017Assignee: Live Nation Entertainment, Inc.Inventors: Dan Cernoch, Ajay Pondicherry, David Refsland, Kenneth Ives-Halperin
-
Patent number: 9729641Abstract: Systems and methods for selecting tiering protocols based on data transmissions over mesh networks within defined spatial areas can be provided. A mesh network can be established within a defined spatial area. Each network device within the mesh network can be a user device or a supernode. Further, a wireless communication link can be established between the user devices and supernodes. A plurality of tiered protocols for tiering data transmissions can be accessed. Data to be transmitted over the mesh network can be analyzed to determine which tiered protocol to select. Path data that identifies a routing path from the a user device to a supernode can be generated, and the data can be transmitted according to the path data.Type: GrantFiled: August 5, 2016Date of Patent: August 8, 2017Assignee: Live Nation Entertainment, Inc.Inventors: Kenneth Ives-Halperin, Jeffrey Kelsey, Jon Flanders, Yen Hoang
-
Publication number: 20170163647Abstract: Authentication systems and methods can selectively authenticate a request to access a resource data store storing access rights associated with a user device. The systems and methods can scalably execute challenges workflows as part of the authentication process. For example, a request to access one or more access rights stored in the data store can be received from the user device. The user device can be authenticated using challenge workflows selected based on a device identifier of the user device. The selected challenge workflows can be executed to determine whether or not to grant access to the access rights stored in the resource data store.Type: ApplicationFiled: December 2, 2016Publication date: June 8, 2017Inventors: Dan Cernoch, Ajay Pondicherry, David Refsland, Kenneth Ives-Halperin
-
Publication number: 20170134386Abstract: A resource-access management system detects whether a user is authorized to access resources. The system may include a user device being configured to include a sensor that detects sensor data associated with the user. Further, the system includes a client qualification engine that determines whether or not a client is authorized to access the resources by comparing the sensor data with a plurality of patterns for evaluating whether or not the user is an authorized user. User scores are generated based on the compared sensor data and the plurality of patterns. Further, a composite score corresponding to the user is generated using the sensor data, plurality of patterns, and one or more additional criteria. Whether the user is granted access to the resources, presented with unauthorized user tests, or blocked from access to the resources depends on the composite score and threshold values.Type: ApplicationFiled: January 19, 2017Publication date: May 11, 2017Inventors: Fengpei Du, Michael Lane, Kenneth Ives-Halperin
-
Publication number: 20170076522Abstract: Communications over short-range connections are used to facilitate whether access to resources is to be granted. For example, upon device discovery of one of an electronic user device and an electronic client device by the other device over a Bluetooth Low Energy connection, an access-enabling code associated with a user device or account can be evaluated for validity and applicability with respect to one or more particular resource specifications. User identity can be verified by comparing the user against previously obtained biometric information.Type: ApplicationFiled: November 24, 2015Publication date: March 16, 2017Inventors: Kenneth Ives-Halperin, Harry C. Evans, III, David Johnson, Scott Wall, David Lilly, Ajay Pondicherry