Patents by Inventor Laurence Hamid

Laurence Hamid has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11704939
    Abstract: Biometrics are increasingly used to provide authentication and/or verification of a user in many security and financial applications for example. However, “spoof attacks” through presentation of biometric artefacts that are “false” allow attackers to fool these biometric verification systems. Accordingly, it would be beneficial to further differentiate the acquired biometric characteristics into feature spaces relating to live and non-living biometrics to prevent non-living biometric credentials triggering biometric verification. The inventors have established a variety of “liveness” detection methodologies which can block either low complexity spoofs or more advanced spoofs. Such techniques may provide for monitoring of responses to challenges discretely or in combination with additional aspects such as the timing of user's responses, depth detection within acquired images, comparison of other images from other cameras with database data etc.
    Type: Grant
    Filed: July 12, 2021
    Date of Patent: July 18, 2023
    Inventors: Laurence Hamid, Stephen Borza
  • Publication number: 20230186686
    Abstract: Biometrics are increasingly used to provide authentication and/or verification of a user in many security and financial applications for example. However, “spoof attacks” through presentation of biometric artefacts that are “false” allow attackers to fool these biometric verification systems. Accordingly, it would be beneficial to further differentiate the acquired biometric characteristics into feature spaces relating to live and non-living biometrics to prevent non-living biometric credentials triggering biometric verification. The inventors have established a variety of “liveness” detection methodologies which can block either low complexity spoofs or more advanced spoofs. Such techniques may provide for monitoring of responses to challenges discretely or in combination with additional aspects such as the timing of user's responses, depth detection within acquired images, comparison of other images from other cameras with database data etc.
    Type: Application
    Filed: February 13, 2023
    Publication date: June 15, 2023
    Inventors: LAURENCE HAMID, STEPHEN BORZA
  • Patent number: 11563740
    Abstract: User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple software applications, web applications, web services, etc. embody this confidential data it is a tradeoff between easy recollection of said identities, passwords, etc. and data security. However, malware by intercepting user credentials provides third parties access to even complex passwords, user credentials, security keys etc. even where these are changed/updated regularly. Within the prior art substantial work has gone into addressing malware. However, in many instances the user is at or very near the computer with a software application executing a transaction requiring credentials/authorisation with a portable electronic device or another device. Accordingly, it would be beneficial to provide users with an out-of-band communications channel for exchanging credentials and/or keys etc.
    Type: Grant
    Filed: July 13, 2021
    Date of Patent: January 24, 2023
    Inventor: Laurence Hamid
  • Publication number: 20210374736
    Abstract: Short-range wireless protocols whilst leveraging enhanced security protocols, encryption techniques, and range raises alternate issues. For example, a user's smartphone would identify all the checkout POS terminals within range whilst the checkout POS terminal would identify all Bluetooth enabled devices within range. Accordingly, it would be beneficial to provide solution that allow for connection between a defined PED and a defined POS terminal within an overall environment of multiple PEDs and POS terminals. It would be further beneficial for the solution to remove the requirements of selecting PEDs and/or POS terminals and the ability to establish a connection between a predetermined device, e.g. a POS terminal or asset, amongst multiple POS terminals or assets.
    Type: Application
    Filed: August 4, 2021
    Publication date: December 2, 2021
    Inventors: LAURENCE HAMID, STEPHEN BORZA
  • Publication number: 20210344673
    Abstract: User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple software applications, web applications, web services, etc. embody this confidential data it is a tradeoff between easy recollection of said identities, passwords, etc. and data security. However, malware by intercepting user credentials provides third parties access to even complex passwords, user credentials, security keys etc. even where these are changed/updated regularly. Within the prior art substantial work has gone into addressing malware. However, in many instances the user is at or very near the computer with a software application executing a transaction requiring credentials/authorisation with a portable electronic device or another device. Accordingly, it would be beneficial to provide users with an out-of-band communications channel for exchanging credentials and/or keys etc.
    Type: Application
    Filed: July 13, 2021
    Publication date: November 4, 2021
    Inventor: Laurence Hamid
  • Publication number: 20210334570
    Abstract: Biometrics are increasingly used to provide authentication and/or verification of a user in many security and financial applications for example. However, “spoof attacks” through presentation of biometric artefacts that are “false” allow attackers to fool these biometric verification systems. Accordingly, it would be beneficial to further differentiate the acquired biometric characteristics into feature spaces relating to live and non-living biometrics to prevent non-living biometric credentials triggering biometric verification. The inventors have established a variety of “liveness” detection methodologies which can block either low complexity spoofs or more advanced spoofs. Such techniques may provide for monitoring of responses to challenges discretely or in combination with additional aspects such as the timing of user's responses, depth detection within acquired images, comparison of other images from other cameras with database data etc.
    Type: Application
    Filed: July 12, 2021
    Publication date: October 28, 2021
    Inventors: LAURENCE HAMID, STEPHEN BORZA
  • Patent number: 11102199
    Abstract: User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple software applications, web applications, web services, etc. embody this confidential data it is a tradeoff between easy recollection of said identities, passwords, etc. and data security. However, malware by intercepting user credentials provides third parties access to even complex passwords, user credentials, security keys etc. even where these are changed/updated regularly. Within the prior art substantial work has gone into addressing malware. However, in many instances the user is at or very near the computer with a software application executing a transaction requiring credentials/authorization with a portable electronic device or another device. Accordingly, it would be beneficial to provide users with an out-of-band communications channel for exchanging credentials and/or keys etc.
    Type: Grant
    Filed: August 10, 2016
    Date of Patent: August 24, 2021
    Inventor: Laurence Hamid
  • Patent number: 11093772
    Abstract: Biometrics are increasingly used to provide authentication and/or verification of a user in many security and financial applications for example. However, “spoof attacks” through presentation of biometric artefacts that are “false” allow attackers to fool these biometric verification systems. Accordingly, it would be beneficial to further differentiate the acquired biometric characteristics into feature spaces relating to live and non-living biometrics to prevent non-living biometric credentials triggering biometric verification. The inventors have established a variety of “liveness” detection methodologies which can block either low complexity spoofs or more advanced spoofs. Such techniques may provide for monitoring of responses to challenges discretely or in combination with additional aspects such as the timing of user's responses, depth detection within acquired images, comparison of other images from other cameras with database data etc.
    Type: Grant
    Filed: June 11, 2019
    Date of Patent: August 17, 2021
    Inventors: Laurence Hamid, Stephen Borza
  • Patent number: 10686602
    Abstract: Whilst portable electronic devices such as smartphones have become ubiquitous for billions of users their primarily uses are consuming content or generating limited low complexity data. In contrast, laptops, desktop PCs etc. allow users to enter extended and/or complex content due to ergonomic user interfaces such as keyboard and mouse. Moving data requires either a third electronic device, e.g. a USB memory drive, or remotely storing the content. Accordingly, it would be beneficial to provide users with the benefit of entering and generating content on one or more electronic systems supporting ergonomic and user compatible haptic interfaces with the ability to store this upon their PED, e.g. smartphone. It would be further beneficial to provide the user also with a means to enter information into applications upon their PED through such external interfaces rather than the haptic interface of their PED, e.g. typically a small touchscreen.
    Type: Grant
    Filed: December 18, 2017
    Date of Patent: June 16, 2020
    Assignee: BLUINK LTD.
    Inventors: Laurence Hamid, Stephen Borza
  • Patent number: 10681081
    Abstract: In order to capture electronic information provided by a user to another user different third parties seek to download tracking software, viruses etc. to the user's computer systems. These may include, but are not limited to, message intercepting, email logging, hacking, spamming, phishing, spyware, malware, keyloggers, screen capturing, Trojan horses, WWW robots (BOTs or bots), IP spoofing, man-in-the-middle attacks, worms and viruses. Whilst within the prior art methodologies exist to protect the message by converting the plaintext at the sender's terminal to ciphertext for transmission before it is re-converted to plaintext at the receiver's (or recipient's) terminal once decrypted the message content, now in plaintext is accessible to malware, Trojan horse software, etc. upon the recipient's terminal allowing its contents to be acquired and transmitted without the recipient's and/or sender's knowledge.
    Type: Grant
    Filed: November 10, 2015
    Date of Patent: June 9, 2020
    Inventors: Laurence Hamid, Stephen Borza
  • Patent number: 10565383
    Abstract: A storage device is provided with memory configured to store user authentication data for accessing an operating system executing on a host computer. A processor is provided to receive a command indicating readiness to accept input from the operating system, and to retrieve the user authentication data from the memory in response to the command.
    Type: Grant
    Filed: April 10, 2017
    Date of Patent: February 18, 2020
    Assignee: Kingston Digital, Inc
    Inventors: Laurence Hamid, Lawrence Reusing
  • Publication number: 20190377963
    Abstract: Biometrics are increasingly used to provide authentication and/or verification of a user in many security and financial applications for example. However, “spoof attacks” through presentation of biometric artefacts that are “false” allow attackers to fool these biometric verification systems. Accordingly, it would be beneficial to further differentiate the acquired biometric characteristics into feature spaces relating to live and non-living biometrics to prevent non-living biometric credentials triggering biometric verification. The inventors have established a variety of “liveness” detection methodologies which can block either low complexity spoofs or more advanced spoofs. Such techniques may provide for monitoring of responses to challenges discretely or in combination with additional aspects such as the timing of user's responses, depth detection within acquired images, comparison of other images from other cameras with database data etc.
    Type: Application
    Filed: June 11, 2019
    Publication date: December 12, 2019
    Inventors: LAURENCE HAMID, STEPHEN BORZA
  • Publication number: 20190205874
    Abstract: Short-range wireless protocols whilst leveraging enhanced security protocols, encryption techniques, and range raises alternate issues. For example, a user's smartphone would identify all the checkout POS terminals within range whilst the checkout POS terminal would identify all Bluetooth enabled devices within range. Accordingly, it would be beneficial to provide solution that allow for connection between a defined PED and a defined POS terminal within an overall environment of multiple PEDs and POS terminals. It would be further beneficial for the solution to remove the requirements of selecting PEDs and/or POS terminals and the ability to establish a connection between a predetermined device, e.g. a POS terminal or asset, amongst multiple POS terminals or assets.
    Type: Application
    Filed: January 2, 2019
    Publication date: July 4, 2019
    Inventors: Laurence HAMID, Stephen Borza
  • Patent number: 10152581
    Abstract: User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple software applications, web applications, web services, etc. embody this confidential data it is a tradeoff between easy recollection of said identities, passwords, etc. and data security. Generally for most users the balance is too far to convenience and ease of recollection such that the probability of third party illegally accessing the confidential data increases. Accordingly, it would be beneficial for users as well as organizations providing/controlling access to systems, resources, and data to be provided with an automatic means of entering password and/or security credential information without the user, for example, selecting the password, knowing the password, having access to the password, or entering the password where the organizations providing/controlling access can establish geo-fences relating to the credential information.
    Type: Grant
    Filed: December 14, 2017
    Date of Patent: December 11, 2018
    Assignee: BluInk Ltd.
    Inventor: Laurence Hamid
  • Patent number: 10079826
    Abstract: User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple software applications, web applications, web services, etc. embody this confidential data it is a tradeoff between easy recollection of said identities, passwords, etc. and data security. Generally for most users the balance is too far to convenience and ease of recollection such that the probability of third party illegally accessing the confidential data increases. Accordingly, it would be beneficial for users as well as organizations providing/controlling access to systems, resources, and data to be provided with an automatic means of entering password and/or security credential information without the user, for example, selecting the password, knowing the password, having access to the password, or entering the password.
    Type: Grant
    Filed: July 28, 2014
    Date of Patent: September 18, 2018
    Assignee: BluInk Ltd.
    Inventor: Laurence Hamid
  • Publication number: 20180123799
    Abstract: Whilst portable electronic devices such as smartphones have become ubiquitous for billions of users their primarily uses are consuming content or generating limited low complexity data. In contrast, laptops, desktop PCs etc. allow users to enter extended and/or complex content due to ergonomic user interfaces such as keyboard and mouse. Moving data requires either a third electronic device, e.g. a USB memory drive, or remotely storing the content. Accordingly, it would be beneficial to provide users with the benefit of entering and generating content on one or more electronic systems supporting ergonomic and user compatible haptic interfaces with the ability to store this upon their PED, e.g. smartphone. It would be further beneficial to provide the user also with a means to enter information into applications upon their PED through such external interfaces rather than the haptic interface of their PED, e.g. typically a small touchscreen.
    Type: Application
    Filed: December 18, 2017
    Publication date: May 3, 2018
    Inventors: Laurence Hamid, Stephen Borza
  • Publication number: 20180114004
    Abstract: User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple software applications, web applications, web services, etc. embody this confidential data it is a tradeoff between easy recollection of said identities, passwords, etc. and data security. Generally for most users the balance is too far to convenience and ease of recollection such that the probability of third party illegally accessing the confidential data increases. Accordingly, it would be beneficial for users as well as organizations providing/controlling access to systems, resources, and data to be provided with an automatic means of entering password and/or security credential information without the user, for example, selecting the password, knowing the password, having access to the password, or entering the password where the organizations providing/controlling access can establish geo-fences relating to the credential information.
    Type: Application
    Filed: December 14, 2017
    Publication date: April 26, 2018
    Inventor: LAURENCE HAMID
  • Patent number: 9916444
    Abstract: Techniques for recovering from unexpected removal of (or other unexpected power loss) a flash memory device from a computer system. An interpolated device driver notes whenever the flash memory device is unexpectedly removed, or otherwise unexpectedly powers off or enters a locked state. If the flash memory device is reinserted, the interpolated device driver reinitializes the flash memory device, and satisfies any flash memory device security protocol, so the flash memory device and the computer system can be restored to their status just before unexpected removal. The interpolated device driver caches requests to the flash memory device, and when status is restored to just before removal, replays those requests to the flash memory device, so the flash memory device responds to those requests as if it had ever been removed. The computer system does not notice any break in service by the flash memory device due to removal and reinsertion.
    Type: Grant
    Filed: August 10, 2015
    Date of Patent: March 13, 2018
    Assignee: Kingston Digital, Inc.
    Inventors: Laurence Hamid, Scott Ashdown
  • Patent number: 9898594
    Abstract: User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple software applications, web applications, web services, etc. embody this confidential data it is a tradeoff between easy recollection of said identities, passwords, etc. and data security. Generally for most users the balance is too far to convenience and ease of recollection such that the probability of third party illegally accessing the confidential data increases. Accordingly, it would be beneficial for users as well as organizations providing/controlling access to systems, resources, and data to be provided with an automatic means of entering password and/or security credential information without the user, for example, selecting the password, knowing the password, having access to the password, or entering the password where the organizations providing/controlling access can establish geo-fences relating to the credential information.
    Type: Grant
    Filed: March 19, 2015
    Date of Patent: February 20, 2018
    Assignee: BluInk Ltd.
    Inventor: Laurence Hamid
  • Patent number: 9866388
    Abstract: While portable electronic devices such as smartphones have become ubiquitous for billions of users their primarily uses are consuming content or generating limited low complexity data. In contrast, laptops, desktop PCs etc. allow users to enter extended and/or complex content due to ergonomic user interfaces such as keyboard and mouse. Moving data requires either a third electronic device, e.g. a USB memory drive, or remotely storing the content. Accordingly, it would be beneficial to provide users with the benefit of entering and generating content on one or more electronic systems supporting ergonomic and user compatible haptic interfaces with the ability to store this upon their PED, e.g. smartphone. It would be further beneficial to provide the user also with a means to enter information into applications upon their PED through such external interfaces rather than the haptic interface of their PED, e.g. typically a small touchscreen.
    Type: Grant
    Filed: November 20, 2015
    Date of Patent: January 9, 2018
    Assignee: BluInk Ltd.
    Inventors: Laurence Hamid, Stephen Borza