Patents by Inventor Laurence Hamid

Laurence Hamid has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9866388
    Abstract: While portable electronic devices such as smartphones have become ubiquitous for billions of users their primarily uses are consuming content or generating limited low complexity data. In contrast, laptops, desktop PCs etc. allow users to enter extended and/or complex content due to ergonomic user interfaces such as keyboard and mouse. Moving data requires either a third electronic device, e.g. a USB memory drive, or remotely storing the content. Accordingly, it would be beneficial to provide users with the benefit of entering and generating content on one or more electronic systems supporting ergonomic and user compatible haptic interfaces with the ability to store this upon their PED, e.g. smartphone. It would be further beneficial to provide the user also with a means to enter information into applications upon their PED through such external interfaces rather than the haptic interface of their PED, e.g. typically a small touchscreen.
    Type: Grant
    Filed: November 20, 2015
    Date of Patent: January 9, 2018
    Assignee: BluInk Ltd.
    Inventors: Laurence Hamid, Stephen Borza
  • Patent number: 9792441
    Abstract: A portable desktop device and method for host computer system hardware recognition and configuration are provided. The portable desktop device causes on a first boot, the host computer system to recognize hardware devices connected thereto, and to configure hardware configuration files of the portable desktop O/S in accordance with the recognized hardware. Once the hardware configuration files have been configured, the system is rebooted. On the second boot, the host computer determines that the portable desktop has been configured for its hardware, and initiates start-up of the portable desktop.
    Type: Grant
    Filed: February 22, 2016
    Date of Patent: October 17, 2017
    Assignee: Kingston Digital, Inc.
    Inventor: Laurence Hamid
  • Patent number: 9736150
    Abstract: A security protocol for use by computing devices communicating over an unsecured network is described. The security protocol makes use of secure data provided to a peripheral memory device from a server via a secure connection. When the peripheral memory device is coupled to a computing device that attempts to establish a secure connection to the server, the secure data is used to verify that the server is authentic. Similarly, the secure data assists the server in verifying that the request to access the server is not being made by a malicious third party.
    Type: Grant
    Filed: April 10, 2015
    Date of Patent: August 15, 2017
    Assignee: DataLocker Inc.
    Inventors: Darren Krahn, Laurence Hamid
  • Publication number: 20170213036
    Abstract: A storage device is provided with memory configured to store user authentication data for accessing an operating system executing on a host computer. A processor is provided to receive a command indicating readiness to accept input from the operating system, and to retrieve the user authentication data from the memory in response to the command.
    Type: Application
    Filed: April 10, 2017
    Publication date: July 27, 2017
    Inventors: Laurence Hamid, Lawrence Reusing
  • Patent number: 9619637
    Abstract: A portable memory storage device is provided for interfacing with a computer system. During operating system startup, fields relating to the operating system are prompted for. The portable memory storage device retrieves from memory therein data for populating said fields and provides same to the computer system.
    Type: Grant
    Filed: June 23, 2015
    Date of Patent: April 11, 2017
    Assignee: Kingston Digital, Inc.
    Inventors: Laurence Hamid, Lawrence Reusing
  • Publication number: 20170048257
    Abstract: User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple software applications, web applications, web services, etc. embody this confidential data it is a tradeoff between easy recollection of said identities, passwords, etc. and data security. However, malware by intercepting user credentials provides third parties access to even complex passwords, user credentials, security keys etc. even where these are changed/updated regularly. Within the prior art substantial work has gone into addressing malware. However, in many instances the user is at or very near the computer with a software application executing a transaction requiring credentials/authorisation with a portable electronic device or another device. Accordingly, it would be beneficial to provide users with an out-of-band communications channel for exchanging credentials and/or keys etc.
    Type: Application
    Filed: August 10, 2016
    Publication date: February 16, 2017
    Inventor: LAURENCE HAMID
  • Publication number: 20170024564
    Abstract: A portable desktop device and method for host computer system hardware recognition and configuration are provided. The portable desktop device causes on a first boot, the host computer system to recognize hardware devices connected thereto, and to configure hardware configuration files of the portable desktop O/S in accordance with the recognized hardware. Once the hardware configuration files have been configured, the system is rebooted. On the second boot, the host computer determines that the portable desktop has been configured for its hardware, and initiates start-up of the portable desktop.
    Type: Application
    Filed: February 22, 2016
    Publication date: January 26, 2017
    Inventor: Laurence Hamid
  • Patent number: 9454387
    Abstract: According to the invention, a first executable environment is provided. The first executable environment is for execution within an operating system environment of a host computer system. The first executable environment is not an emulator for emulating any of another processor and another operating system. A software application is provided for installation and execution within the operating system environment. The software application is for fixed installation and not for installation in a portable fashion for being ported from one host computer system to another. The software application is then installed within the first executable environment, the installed software application installed within a removable peripheral memory storage device for execution within the first executable environment.
    Type: Grant
    Filed: September 7, 2012
    Date of Patent: September 27, 2016
    Assignee: Kingston Digital, Inc.
    Inventors: Laurence Hamid, Marc Charbonneau
  • Patent number: 9430250
    Abstract: Bootability of a computer system with multiple LUNs. A flash device powers-on into a default LUN, from which the system boots, maintaining any other LUNs unavailable. The first LUN reconfigures the system to remove itself as the available LUN, to load a second LUN as the only available LUN, and to reboot the computer system into the newly available second LUN. The second LUN reconfigures the system to load any additional LUNs, such as removable storage on the flash drive. Upon reconfiguration, the system includes multiple LUNs. The second LUN includes an interpolated LUN driver, which exposes additional LUNs before operation of other device drivers. The interpolated LUN driver takes control during boot-up, exposing any available LUNs before the regular environment's operating system.
    Type: Grant
    Filed: December 3, 2012
    Date of Patent: August 30, 2016
    Assignee: Kingston Digital, Inc.
    Inventors: Laurence Hamid, Dean Charles Michaud
  • Patent number: 9432397
    Abstract: Booting an operating system that includes a secure preboot environment that performs integrity checks against security threats. A computer system boots to a preboot environment, which performs integrity checks and other anti-malware operations. Once the preboot environment finishes, the system reboots into a regular environment. The preboot environment can reside on a secure portion of a flash memory, with a computer system booting therefrom; or the preboot environment can reside securely in the computer system. The preboot environment includes integrity checks for a regular environment, and anti-malware programming. Once the preboot environment is done, the computer system reboots into a regular environment, such as from the flash memory or on the computer system. The integrity checks confirm that files in the regular environment are unchanged or uninfected. The integrity checks include determining the accuracy of a trusted system configuration on the computer system, such as using a TPM.
    Type: Grant
    Filed: July 28, 2015
    Date of Patent: August 30, 2016
    Assignee: Kingston Digital, Inc.
    Inventor: Laurence Hamid
  • Publication number: 20160148597
    Abstract: Whilst portable electronic devices such as smartphones have become ubiquitous for billions of users their primarily uses are consuming content or generating limited low complexity data. In contrast, laptops, desktop PCs etc. allow users to enter extended and/or complex content due to ergonomic user interfaces such as keyboard and mouse. Moving data requires either a third electronic device, e.g. a USB memory drive, or remotely storing the content. Accordingly, it would be beneficial to provide users with the benefit of entering and generating content on one or more electronic systems supporting ergonomic and user compatible haptic interfaces with the ability to store this upon their PED, e.g. smartphone. It would be further beneficial to provide the user also with a means to enter information into applications upon their PED through such external interfaces rather than the haptic interface of their PED, e.g. typically a small touchscreen.
    Type: Application
    Filed: November 20, 2015
    Publication date: May 26, 2016
    Inventors: Laurence Hamid, Stephen Borza
  • Publication number: 20160134642
    Abstract: In order to capture electronic information provided by a user to another user different third parties seek to download tracking software, viruses etc. to the user's computer systems. These may include, but are not limited to, message intercepting, email logging, hacking, spamming, phishing, spyware, malware, keyloggers, screen capturing, Trojan horses, WWW robots (BOTs or bots), IP spoofing, man-in-the-middle attacks, worms and viruses. Whilst within the prior art methodologies exist to protect the message by converting the plaintext at the sender's terminal to ciphertext for transmission before it is re-converted to plaintext at the receiver's (or recipient's) terminal once decrypted the message content, now in plaintext is accessible to malware, Trojan horse software, etc. upon the recipient's terminal allowing its contents to be acquired and transmitted without the recipient's and/or sender's knowledge.
    Type: Application
    Filed: November 10, 2015
    Publication date: May 12, 2016
    Inventors: Laurence Hamid, Stephen Borza
  • Patent number: 9268943
    Abstract: A portable desktop device and method for host computer system hardware recognition and configuration are provided. The portable desktop device causes on a first boot, the host computer system to recognize hardware devices connected thereto, and to configure hardware configuration files of the portable desktop O/S in accordance with the recognized hardware. Once the hardware configuration files have been configured, the system is rebooted. On the second boot, the host computer determines that the portable desktop has been configured for its hardware, and initiates start-up of the portable desktop.
    Type: Grant
    Filed: May 4, 2015
    Date of Patent: February 23, 2016
    Assignee: Imation Corp.
    Inventor: Laurence Hamid
  • Publication number: 20160041792
    Abstract: Techniques for recovering from unexpected removal of (or other unexpected power loss) a flash memory device from a computer system. An interpolated device driver notes whenever the flash memory device is unexpectedly removed, or otherwise unexpectedly powers off or enters a locked state. If the flash memory device is reinserted, the interpolated device driver reinitializes the flash memory device, and satisfies any flash memory device security protocol, so the flash memory device and the computer system can be restored to their status just before unexpected removal. The interpolated device driver caches requests to the flash memory device, and when status is restored to just before removal, replays those requests to the flash memory device, so the flash memory device responds to those requests as if it had ever been removed. The computer system does not notice any break in service by the flash memory device due to removal and reinsertion.
    Type: Application
    Filed: August 10, 2015
    Publication date: February 11, 2016
    Inventors: Laurence Hamid, Scott Ashdown
  • Publication number: 20160028748
    Abstract: Booting an operating system that includes a secure preboot environment that performs integrity checks against security threats. A computer system boots to a preboot environment, which performs integrity checks and other anti-malware operations. Once the preboot environment finishes, the system reboots into a regular environment. The preboot environment can reside on a secure portion of a flash memory, with a computer system booting therefrom; or the preboot environment can reside securely in the computer system. The preboot environment includes integrity checks for a regular environment, and anti-malware programming. Once the preboot environment is done, the computer system reboots into a regular environment, such as from the flash memory or on the computer system. The integrity checks confirm that files in the regular environment are unchanged or uninfected. The integrity checks include determining the accuracy of a trusted system configuration on the computer system, such as using a TPM.
    Type: Application
    Filed: July 28, 2015
    Publication date: January 28, 2016
    Inventor: Laurence Hamid
  • Publication number: 20150371025
    Abstract: A method and apparatus are disclosed wherein a portable memory storage device is provided for interfacing with a communications port of the computer system. During operating system startup of the operating system of the computer, fields relating to security of the operating system are prompted for. The portable memory store retrieves from memory therein data for populating said fields and provides same to the computer system mimicking a data entry device other than a portable memory store.
    Type: Application
    Filed: June 23, 2015
    Publication date: December 24, 2015
    Inventors: Laurence Hamid, Lawrence Reusing
  • Publication number: 20150271164
    Abstract: User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple software applications, web applications, web services, etc. embody this confidential data it is a tradeoff between easy recollection of said identities, passwords, etc. and data security. Generally for most users the balance is too far to convenience and ease of recollection such that the probability of third party illegally accessing the confidential data increases. Accordingly, it would be beneficial for users as well as organizations providing/controlling access to systems, resources, and data to be provided with an automatic means of entering password and/or security credential information without the user, for example, selecting the password, knowing the password, having access to the password, or entering the password.
    Type: Application
    Filed: July 28, 2014
    Publication date: September 24, 2015
    Inventor: Laurence Hamid
  • Publication number: 20150269369
    Abstract: User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple software applications, web applications, web services, etc. embody this confidential data it is a tradeoff between easy recollection of said identities, passwords, etc. and data security. Generally for most users the balance is too far to convenience and ease of recollection such that the probability of third party illegally accessing the confidential data increases. Accordingly, it would be beneficial for users as well as organizations providing/controlling access to systems, resources, and data to be provided with an automatic means of entering password and/or security credential information without the user, for example, selecting the password, knowing the password, having access to the password, or entering the password where the organizations providing/controlling access can establish geo-fences relating to the credential information.
    Type: Application
    Filed: March 19, 2015
    Publication date: September 24, 2015
    Inventor: Laurence Hamid
  • Patent number: 9129114
    Abstract: Booting an operating system that includes a secure preboot environment that performs integrity checks against security threats. A computer system boots to a preboot environment, which performs integrity checks and other anti-malware operations. Once the preboot environment finishes, the system reboots into a regular environment. The preboot environment can reside on a secure portion of a flash memory, with a computer system booting therefrom; or the preboot environment can reside securely in the computer system. The preboot environment includes integrity checks for a regular environment, and anti-malware programming. Once the preboot environment is done, the computer system reboots into a regular environment, such as from the flash memory or on the computer system. The integrity checks confirm that files in the regular environment are unchanged or uninfected. The integrity checks include determining the accuracy of a trusted system configuration on the computer system, such as using a TPM.
    Type: Grant
    Filed: December 3, 2012
    Date of Patent: September 8, 2015
    Assignee: Imation Corp.
    Inventor: Laurence Hamid
  • Patent number: 9118665
    Abstract: A security protocol for use by computing devices communicating over an unsecured network is described. The security protocol makes use of secure data provided to a peripheral memory device from a server via a secure connection. When the peripheral memory device is coupled to a computing device that attempts to establish a secure connection to the server, the secure data is used to verify that the server is authentic. Similarly, the secure data assists the server in verifying that the request to access the server is not being made by a malicious third party.
    Type: Grant
    Filed: April 1, 2008
    Date of Patent: August 25, 2015
    Assignee: Imation Corp.
    Inventors: Darren Krahn, Laurence Hamid