Patents by Inventor Matthew Kamerman

Matthew Kamerman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8296341
    Abstract: Personal information of users is used to customize the browsing experiences of the users on a World-Wide-Web site. To ensure privacy of the users' personal information, each user is assigned a unique Universal Anonymous Identifier (UAI). The UAI is generated by a trusted third party and provided to the Web site operator. The Web site operator then indexes the users' personal information by UAI. Only the user has the ability to correlate his/her true identity with his/her personal information.
    Type: Grant
    Filed: March 4, 2009
    Date of Patent: October 23, 2012
    Assignee: PersonalPath Systems, Inc.
    Inventors: Thomas Hagan, David Levy, Matthew Kamerman
  • Publication number: 20090171982
    Abstract: Personal information of users is used to customize the browsing experiences of the users on a World-Wide-Web site. To ensure privacy of the users' personal information, each user is assigned a unique Universal Anonymous Identifier (UAI). The UAI is generated by a trusted third party and provided to the Web site operator. The Web site operator then indexes the users' personal information by UAI. Only the user has the ability to correlate his/her true identity with his/her personal information.
    Type: Application
    Filed: March 4, 2009
    Publication date: July 2, 2009
    Inventors: Thomas Hagan, David Levy, Matthew Kamerman
  • Patent number: 7526485
    Abstract: Personal information of users is used to customize the browsing experiences of the users on a World-Wide-Web site. To ensure privacy of the users' personal information, each user is assigned a unique Universal Anonymous Identifier (UAI). The UAI is generated by a trusted third party and provided to the Web site operator. The Web site operator then indexes the users' personal information by UAI. Only the user has the ability to correlate his/her true identity with his/her personal information.
    Type: Grant
    Filed: July 7, 2005
    Date of Patent: April 28, 2009
    Assignee: Alere Health Systems, Inc.
    Inventors: Thomas Hagan, David Levy, Matthew Kamerman
  • Publication number: 20060004772
    Abstract: Personal information of users is used to customize the browsing experiences of the users on a World-Wide-Web site. To ensure privacy of the users' personal information, each user is assigned a unique Universal Anonymous Identifier (UAI). The UAI is generated by a trusted third party and provided to the Web site operator. The Web site operator then indexes the users' personal information by UAI. Only the user has the ability to correlate his/her true identity with his/her personal information.
    Type: Application
    Filed: July 7, 2005
    Publication date: January 5, 2006
    Inventors: Thomas Hagan, David Levy, Matthew Kamerman
  • Publication number: 20030190046
    Abstract: A three-party signing protocol uses a Trusted Third Party (denoted T) to simulate a two-party protocol in which a sender, designated party A, anonymously signs data intended for a particular receiver, designated party B, such that B can verify the signature on the data without learning A's true identity, and data and signatures received by different receivers cannot be cross-linked, aggregated, or associated with a single sender. In this three-party signing protocol, A has only one public/private signature key-pair. In the three-party signing protocol, T is permitted to “see” signatures generated by A, but B is not permitted to “see” signatures generated by A, unless they are randomized or encrypted, since doing so would permit A's generated signatures and signed data to be cross-linked. Thus, in the three-party signing protocol, T is used to “vouch to B on behalf of A” that signatures generated by A are valid.
    Type: Application
    Filed: October 17, 2002
    Publication date: October 9, 2003
    Inventors: matthew-kamerman, Stephen Michael Matyas,, Carol Anne McNab
  • Publication number: 20030105959
    Abstract: Computer user authentication and cryptographic key protection through the use of personal entropy (PE) is implemented using a PE answering algorithm which enables a user of a computing system to generate secret values from answers to questions previously created by the user. The questions are displayed to the user on a user interface (UI), and the user is prompted to select a subset of the questions to answer. When the user provides answers for the selected subset, an attempt is made to generate the secret value from a portion of the subset and possibly other information. If the secret value cannot be generated from at least a portion of the selected subset, the user is prompted to select a second subset of the displayed questions and provide answers to the selected second set of questions. When the user provides answers to the second selected subset of questions, an attempt is made to generate the secret value from a portion of the first and second sets of answers and possibly other information.
    Type: Application
    Filed: December 3, 2001
    Publication date: June 5, 2003
    Inventors: Stephen M. Matyas, Matthew A. Kamerman
  • Publication number: 20010054155
    Abstract: Personal information of users is used to customize the browsing experiences of the users on a World-Wide-Web site. To ensure privacy of the users' personal information, each user is assigned a unique Universal Anonymous Identifier (UAI). The UAI is generated by a trusted third party and provided to the Web site operator. The Web site operator then indexes the users' personal information by UAI. Only the user has the ability to correlate his/her true identity with his/her personal information.
    Type: Application
    Filed: December 21, 2000
    Publication date: December 20, 2001
    Inventors: Thomas Hagan, David Levy, Matthew Kamerman