Patents by Inventor Konstantinos Loupos
Konstantinos Loupos has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11481716Abstract: The self-audited routing of a shipping container includes acquiring a contemporaneous location of a shipping container within location based circuitry of a computing device affixed to the shipping container and retrieving from memory of the computing device affixed to the shipping container, an expected node and a destination node from a sequence of nodes in a path from an origin node of the shipping container, to the destination node. The contemporaneous location is then compared to a location of the expected node and, on the condition that the contemporaneous location is not within a threshold distance of the location of the expected node, a message is transmitted from the computing device over a wireless computer communications network to a remotely disposed client computer indicating a fault in routing of the shipping container to the destination node.Type: GrantFiled: June 10, 2020Date of Patent: October 25, 2022Assignee: INLECOM GROUP BVBAInventors: Konstantinos Loupos, Patrick J. O'Sullivan, Antonios Mygiakis, Panayotis Katsoulakos, Gerasimos Kouloumpis, Zisis Palaskas
-
Patent number: 11323883Abstract: Internet-of-Things (IoT) prioritized sensor authentication management includes receiving in an IoT gateway different packets of data from different sensors over a computer communications network. For each received packet of data from a corresponding one of the different sensors, the received packet of data is compared to a pattern associated with the corresponding one of the different sensors. On the condition that the received packet of data is within a threshold of similarity to the pattern, a sensor value may be extracted from the received packet of data and transmitted to a sensor monitor. But otherwise, the received packet of data is placed into quarantine in memory of the IoT gateway, authentication of the corresponding one of the different sensors is performed, and in response to the authentication, the packet is released from quarantine, the sensor value extracted from the received packet of data and transmitted to the sensor monitor.Type: GrantFiled: September 30, 2019Date of Patent: May 3, 2022Assignee: INLECOM SYSTEMS LIMITEDInventors: Konstantinos Loupos, Gerasimos Kouloumpis, Alexander Papageorgiou, Takis Katsoulakos, Patrick J. O'Sullivan
-
Patent number: 11321662Abstract: An authenticated container access method includes selecting both a destination node for a shipping container positioned at a contemporaneous node and also a next node selected on a path from the contemporaneous node to the destination node. The method additionally includes writing both the next node and the destination node in an origin token along with an identification of an authorized individual enabled to access the shipping container, and then both storing the origin token in a computing device affixed to the shipping container and also transmitting the origin token to a computer at the next node. A request to access the shipping container is later received in the computing device and the token, extracted from the request. The tokens are compared and access to the shipping container permitted on condition that an identification value in the extracted token matches the identification of the authorized individual in the origin token.Type: GrantFiled: June 8, 2020Date of Patent: May 3, 2022Assignee: INLECOM GROUP BVBAInventors: Konstantinos Loupos, Patrick J. O'Sullivan, Antonios Mygiakis, Gerasimos Kouloumpis, Georgia Kokona Tsiochantari
-
Patent number: 11321477Abstract: Embodiments of the present invention provide a method, system and computer program product for co-dependent document container management. Co-dependent document container management includes loading into memory of a computer, a document container encapsulating a document, a co-dependency rule assigning a dependency of access to the document upon a specific geographic location, and co-dependency document access program code. The program code of the container may be executed in the memory of the computer causing the retrieval of a geographic position of the computer, the application of the co-dependency rule to the retrieved geographic position and, on condition that the geographic position of the computer satisfies the co-dependency rule, the location of a document viewer registered in the computer to render the document and the direction of the computer to launch the document viewer with the document as input to the document viewer.Type: GrantFiled: June 5, 2020Date of Patent: May 3, 2022Assignee: INLECOM GROUP BVBAInventors: Panayotis Katsoulakos, Gerasimos Kouloumpis, Patrick J. O'Sullivan, Ioanna Fergadiotou, Konstantinos Loupos, Antonios Mygiakis
-
Patent number: 11256492Abstract: A method for computer program source level trust assurance in an Internet of Things (IoT) device includes receiving a request to install a computer program in an IoT device and storing, in temporary memory, a file containing a binary form of the computer program and an authenticity fingerprint incorporated as part of the binary form of the computer program. The method additionally includes extracting the authenticity fingerprint from the binary form of the computer program, retrieving a different fingerprint from remote storage and comparing the different fingerprint to the extracted fingerprint. Finally, the method includes installing the computer program into the IoT device in response to the comparison indicating that the extracted fingerprint is identical to the different fingerprint, but otherwise rejecting the request to install the computer program.Type: GrantFiled: June 5, 2020Date of Patent: February 22, 2022Assignee: Inlecom Systems Ltd.Inventors: Jenny Rainbird, Alexander Papageorgiou, Konstantinos Loupos, Patrick J. O'Sullivan, Antonios Mygiakis
-
Publication number: 20210390501Abstract: The self-audited routing of a shipping container includes acquiring a contemporaneous location of a shipping container within location based circuitry of a computing device affixed to the shipping container and retrieving from memory of the computing device affixed to the shipping container, an expected node and a destination node from a sequence of nodes in a path from an origin node of the shipping container, to the destination node. The contemporaneous location is then compared to a location of the expected node and, on the condition that the contemporaneous location is not within a threshold distance of the location of the expected node, a message is transmitted from the computing device over a wireless computer communications network to a remotely disposed client computer indicating a fault in routing of the shipping container to the destination node.Type: ApplicationFiled: June 10, 2020Publication date: December 16, 2021Inventors: Konstantinos Loupos, Patrick J. O'Sullivan, Antonois Mygiakis, Panayotis Katsoulakos, Gerasimos Kouloumpis, Zisis Palaskas
-
Publication number: 20210383003Abstract: Embodiments of the present invention provide a method, system and computer program product for co-dependent document container management. Co-dependent document container management includes loading into memory of a computer, a document container encapsulating a document, a co-dependency rule assigning a dependency of access to the document upon a specific geographic location, and co-dependency document access program code. The program code of the container may be executed in the memory of the computer causing the retrieval of a geographic position of the computer, the application of the co-dependency rule to the retrieved geographic position and, on condition that the geographic position of the computer satisfies the co-dependency rule, the location of a document viewer registered in the computer to render the document and the direction of the computer to launch the document viewer with the document as input to the document viewer.Type: ApplicationFiled: June 5, 2020Publication date: December 9, 2021Inventors: Panayotis Katsoulakos, Gerasimos Kouloumpis, Patrick J. O'Sullivan, Ioanna Fergadiotou, Konstantinos Loupos, Antonios Mygiakis
-
Publication number: 20210383325Abstract: An authenticated container access method includes selecting both a destination node for a shipping container positioned at a contemporaneous node and also a next node selected on a path from the contemporaneous node to the destination node. The method additionally includes writing both the next node and the destination node in an origin token along with an identification of an authorized individual enabled to access the shipping container, and then both storing the origin token in a computing device affixed to the shipping container and also transmitting the origin token to a computer at the next node. A request to access the shipping container is later received in the computing device and the token, extracted from the request. The tokens are compared and access to the shipping container permitted on condition that an identification value in the extracted token matches the identification of the authorized individual in the origin token.Type: ApplicationFiled: June 8, 2020Publication date: December 9, 2021Inventors: Konstantinos Loupos, Patrick J. O'Sullivan, Antonios Mygiakis, Gerasimos Kouloumpis, Georgia Kokona Tsiochantari
-
Publication number: 20210382704Abstract: A method for computer program source level trust assurance in an Internet of Things (IoT) device includes receiving a request to install a computer program in an IoT device and storing, in temporary memory, a file containing a binary form of the computer program and an authenticity fingerprint incorporated as part of the binary form of the computer program. The method additionally includes extracting the authenticity fingerprint from the binary form of the computer program, retrieving a different fingerprint from remote storage and comparing the different fingerprint to the extracted fingerprint. Finally, the method includes installing the computer program into the IoT device in response to the comparison indicating that the extracted fingerprint is identical to the different fingerprint, but otherwise rejecting the request to install the computer program.Type: ApplicationFiled: June 5, 2020Publication date: December 9, 2021Inventors: Jenny Rainbird, Alexander Papageorgiou, Konstantinos Loupos, Patrick J. O'Sullivan, Antonios Mygiakis
-
Patent number: 11134383Abstract: An IoT sensor authentication method includes receiving in an IoT gateway or another IoT sensor, a packet of data from a sensor over a wireless computer communications network, placing the packet of data into quarantine in memory of the IoT gateway and offloading authentication of the sensor to an authentication processor executing in a separate process address space in the IoT gateway. Thereafter, an authentication result is received from the authentication processor and, responsive to the authentication result indicating successfully authentication of the sensor, the packet is released from quarantine, a sensor value extracted from the packet of data and the sensor value transmitted to a sensor monitor. But, responsive to the authentication result indicating a failure to authenticate the sensor, the packet of data is discarded and removed from quarantine.Type: GrantFiled: September 30, 2019Date of Patent: September 28, 2021Assignee: INLECOM SYSTEMS LIMITEDInventors: Konstantinos Loupos, Gerasimos Kouloumpis, Alexander Papageorgiou, Takis Katsoulakos, Patrick J. O'Sullivan
-
Publication number: 20210099875Abstract: An IoT sensor authentication method includes receiving in an IoT gateway or another IoT sensor, a packet of data from a sensor over a wireless computer communications network, placing the packet of data into quarantine in memory of the IoT gateway and offloading authentication of the sensor to an authentication processor executing in a separate process address space in the IoT gateway. Thereafter, an authentication result is received from the authentication processor and, responsive to the authentication result indicating successfully authentication of the sensor, the packet is released from quarantine, a sensor value extracted from the packet of data and the sensor value transmitted to a sensor monitor. But, responsive to the authentication result indicating a failure to authenticate the sensor, the packet of data is discarded and removed from quarantine.Type: ApplicationFiled: September 30, 2019Publication date: April 1, 2021Inventors: Konstantinos Loupos, Gerasimos Kouloumpis, Alexander Papageorgiou, Takis Katsoulakos, Patrick J. O'Sullivan
-
Publication number: 20210099881Abstract: Internet-of-Things (IoT) prioritized sensor authentication management includes receiving in an IoT gateway different packets of data from different sensors over a computer communications network. For each received packet of data from a corresponding one of the different sensors, the received packet of data is compared to a pattern associated with the corresponding one of the different sensors. On the condition that the received packet of data is within a threshold of similarity to the pattern, a sensor value may be extracted from the received packet of data and transmitted to a sensor monitor. But otherwise, the received packet of data is placed into quarantine in memory of the IoT gateway, authentication of the corresponding one of the different sensors is performed, and in response to the authentication, the packet is released from quarantine, the sensor value extracted from the received packet of data and transmitted to the sensor monitor.Type: ApplicationFiled: September 30, 2019Publication date: April 1, 2021Inventors: Konstantinos Loupos, Gerasimos Kouloumpis, Alexander Papageorgiou, Takis Katsoulakos, Patrick J. O'Sullivan