Patents by Inventor Michael William Paddon

Michael William Paddon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10069627
    Abstract: Electronic devices are adapted to generate cryptographic keys from one or more biometrics. According to one examples, an electronic device can obtain a non-encoded bit string associated with biometric information for an individual. The non-encoded bit string can be treated as if it were encoded and a decoding operation may be applied to the bit string, resulting in a modified bit string. One or more cryptographic keys can then be generated based at least in part on the modified bit string. Other aspects, embodiments, and features are also included.
    Type: Grant
    Filed: July 2, 2015
    Date of Patent: September 4, 2018
    Assignee: QUALCOMM Incorporated
    Inventors: Michael William Paddon, Miriam Wiggers De Vries, Philip Michael Hawkes, Craig Brown, Guilherme Luiz Karnas Hoefel, Craig William Northway
  • Patent number: 9746929
    Abstract: Aspects of the present disclosure provide a gesture recognition method and an apparatus for capturing gesture. The apparatus categorizes the raw data of a gesture into gesture elements, and utilizes the contextual dependency between the gesture elements to perform gesture recognition with a high degree of accuracy and small data size. A gesture may be formed by a sequence of one or more gesture elements.
    Type: Grant
    Filed: November 20, 2014
    Date of Patent: August 29, 2017
    Assignee: QUALCOMM Incorporated
    Inventors: Yoshihisa Maruya, Michael William Paddon, Matthew Christian Duggan, Kento Tarui
  • Publication number: 20170091420
    Abstract: A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus can collect a plurality of environmental factors. The apparatus can refine a list of potential items being consumed by a user each time one of the plurality of environmental factors is collected until a confidence threshold is reached. The apparatus can select an item from the list of potential items being consumed by the user once the confidence threshold is reached. The apparatus can determine a set of nutritional factors associated with the item selected from the list of potential items being consumed by the user.
    Type: Application
    Filed: September 24, 2015
    Publication date: March 30, 2017
    Inventors: Matthew Christian DUGGAN, Michael William PADDON
  • Patent number: 9578508
    Abstract: System, apparatus, and methods are provided for protecting against malicious infrastructure in a wireless communication network. A system determines a trust metric for an access point and decides to avoid communication with the access point based on the trust metric for the access point. The trust metric may, for example, be a numeric value such as a probability of trustworthiness or a categorization of trustworthiness. The system may determine the trust metric by receiving a list of access points and their corresponding trust metrics and matching a potential access point to its listed trust metric. The system may try to avoid using an untrustworthy access point's services unless it deems the services important enough to risk the communication.
    Type: Grant
    Filed: March 13, 2013
    Date of Patent: February 21, 2017
    Assignee: QUALCOMM INCORPORATED
    Inventors: Matthew C. Duggan, Michael William Paddon, Kento Tarui
  • Publication number: 20170005794
    Abstract: Electronic devices are adapted to generate cryptographic keys from one or more biometrics. According to one examples, an electronic device can obtain a non-encoded bit string associated with biometric information for an individual. The non-encoded bit string can be treated as if it were encoded and a decoding operation may be applied to the bit string, resulting in a modified bit string. One or more cryptographic keys can then be generated based at least in part on the modified bit string. Other aspects, embodiments, and features are also included.
    Type: Application
    Filed: July 2, 2015
    Publication date: January 5, 2017
    Inventors: Michael William Paddon, Miriam Wiggers De Vries, Philip Michael Hawkes, Craig Brown, Guilherme Luiz Karnas Hoefel, Craig William Northway
  • Publication number: 20160371368
    Abstract: In an embodiment, search parameters in a series of search queries directed to a target node of a semi-structured database are categorized as frequently recurring parameters. A partial search query template is populated with shortcut information related to the search parameters, and then used to facilitate execution of a new search query that includes the same search parameters. In another embodiment, an index is generated that links search parameters that return intermediate search result values to search result values that are configured to be obtained when a search is conducted on the intermediate search result values. The index can be generated based upon monitoring of actual searches within the semi-structured database, or alternatively based upon an inspection of the semi-structured database itself.
    Type: Application
    Filed: September 24, 2015
    Publication date: December 22, 2016
    Inventors: Craig Matthew BROWN, Michael William PADDON, Matthew Christian DUGGAN, Kento TARUI, Xavier Claude FRANC, Lei NI, Louis PAN, Joel Timothy BEACH
  • Publication number: 20160371391
    Abstract: In an embodiment, a server detects a threshold number of search queries for which the same value at a target node for a document in a semi-structured database is returned as a search result. The server caches the value based on the detection. In another embodiment, the server detects a threshold number of search queries that result in values being returned as search results from a target node. The server caches values at the target node based on the detection. In another embodiment, the server records search result heuristics that indicate a degree to which search results are expected from a set of search queries. The server obtains a merge query and establishes an order in which search queries in the merge query are to be executed based on the recorded search result heuristics.
    Type: Application
    Filed: September 24, 2015
    Publication date: December 22, 2016
    Inventors: Craig Matthew BROWN, Michael William PADDON, Xavier Claude FRANC, Louis PAN, Joel Timothy BEACH
  • Publication number: 20160371339
    Abstract: In an embodiment, a server executes a first query in a semi-structured database to determine a first list of nodes that each include at least one node-specific data entry that satisfies the first query. The server initializes a Bloom filter with the first list of nodes. The server filters a list of candidate nodes for a second query based on the Bloom filter. The server executes, in conjunction with a faceted search procedure of a set of documents in the semi-structured database, a second query that uses the filtered list of candidate nodes as a facet to determine a second list of nodes that each includes one or more node-specific data entries from the facet that satisfy the second query.
    Type: Application
    Filed: September 24, 2015
    Publication date: December 22, 2016
    Inventors: Michael William PADDON, Xavier Claude FRANC, Craig Matthew BROWN, Matthew Christian DUGGAN
  • Publication number: 20160371392
    Abstract: In an embodiment, a server indexes, in a label-path indexed database, a first data entry at a first target node with a given node identifier in accordance with a label-path indexing protocol. After determining that a number of paths from the root node to non-root nodes that share the given node identifier exceeds a threshold, the server indexes a second data entry at a second target node with the given node identifier in a flat-indexed database in accordance with a flat indexing protocol. In an alternative embodiment, the server indexes the first data entry redundantly in both the label-path indexed database and the flat-indexed database while the path number does not exceed the threshold. When the path number exceeds the threshold, the second data entry is indexed in the flat-indexed database only.
    Type: Application
    Filed: September 24, 2015
    Publication date: December 22, 2016
    Inventors: Craig Matthew BROWN, Xavier Claude FRANC, Michael William PADDON, Matthew Christian DUGGAN, Kento TARUI
  • Publication number: 20160345165
    Abstract: Methods, systems, and devices are described for wireless communication to enable data collection from wireless devices in an efficient manner. An aspect of the data collection approaches described herein may involve determining a smaller group of wireless devices from which to collect data. Determining the group may be performed such that the data collected is representative of the wireless devices as a whole. For example, a statistically significant group of wireless devices may be selected to be statistically representative of the wireless devices of the network. Various criteria may be identified for selecting the group. Such criteria may include a specified technique for selecting wireless devices for the group.
    Type: Application
    Filed: May 22, 2015
    Publication date: November 24, 2016
    Inventors: Guilherme Luiz Karnas Hoefel, Brian Fink, Michael William Paddon, Craig Brown, Vitor Carvalho
  • Patent number: 9459807
    Abstract: Methods and apparatus for providing resources for cloud storage may include accessing physical storage capacity on a device, connected to a network cloud, including a virtual primary storage disk and at least one virtual secondary storage disk having access to the physical storage capacity. In addition, the methods and apparatus may include dynamically updating the available storage capacity of the virtual secondary storage disk for network cloud storage based upon usage of the physical storage capacity by the virtual primary storage disk and the virtual secondary storage disk.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: October 4, 2016
    Assignee: QUALCOMM INCORPORATED
    Inventors: Craig Matthew Brown, Michael William Paddon
  • Patent number: 9424417
    Abstract: Methods, devices, systems, and non-transitory processor-readable storage media for authenticating a computing device to access functionalities. An embodiment method may include operations for receiving in the computing device a signal from a proximity beacon device, obtaining from the received signal information that indicates whether the proximity beacon device has detected movement, determining whether the obtained information matches stored data corresponding to the proximity beacon device, performing an abbreviated authentication operations for the computing device to access the functionalities when it is determined that the obtained information from the received signal matches the stored data, and performing a normal authentication operations for the computing device to access the functionalities when it is determined that the obtained information from the received signal does not match the stored data.
    Type: Grant
    Filed: June 4, 2014
    Date of Patent: August 23, 2016
    Assignee: QUALCOMM Incorporated
    Inventors: Craig Matthew Brown, Joel Benjamin Linsky, Michael William Paddon, Craig William Northway
  • Publication number: 20160232346
    Abstract: The disclosure relates in some aspects to protecting systems and data from maliciously caused destruction. Data integrity is maintained by monitoring data to detect and prevent potential attacks. A mechanism for tracking whether data is tainted is implemented in a Data Flow computer architecture or some other suitable architecture. In some aspects, a taint checking mechanism is implemented within a register file, memory management, and an instruction set of such an architecture. To this end, an indication of whether the data stored in a given physical memory location is tainted is stored along with the physical memory location. For example, a register can include a bit for a corresponding taint flag, a memory page can include a bit for a corresponding taint flag, and an input/output (I/O) port can include a bit for a corresponding taint flag.
    Type: Application
    Filed: February 5, 2015
    Publication date: August 11, 2016
    Inventors: Michael William Paddon, Matthew Christian Duggan, Craig Brown, Kento Tarui
  • Publication number: 20160124512
    Abstract: Aspects of the present disclosure provide a gesture recognition method and an apparatus for capturing gesture. The apparatus categorizes the raw data of a gesture into gesture elements, and utilizes the contextual dependency between the gesture elements to perform gesture recognition with a high degree of accuracy and small data size. A gesture may be formed by a sequence of one or more gesture elements.
    Type: Application
    Filed: November 20, 2014
    Publication date: May 5, 2016
    Inventors: Yoshihisa Maruya, Michael William Paddon, Matthew Christian Duggan, Kento Tarui
  • Patent number: 9251253
    Abstract: Methods and systems for indexing patent related prior art citations are disclosed. Electronic documents can be obtained from one or more patent information systems. An OCR process can be performed on some of the electronic documents. Citations within the documents can be identified and compared to a trusted records list. The citations can be associated with one or more predetermined categories. For example, citations can be categorized into groups such as when a reference is cited (e.g., with original filing, pre and post allowance), who provided the reference (e.g., cited by the applicant, or the examiner), and how the reference is characterized (e.g., statutory basis, combination of references). The citations and corresponding categories can be output to a user or made available for subsequent processing.
    Type: Grant
    Filed: January 5, 2013
    Date of Patent: February 2, 2016
    Assignee: QUALCOMM Incorporated
    Inventors: Craig M. Brown, Michael William Paddon, Guy Perry
  • Publication number: 20150356289
    Abstract: Methods, devices, systems, and non-transitory processor-readable storage media for authenticating a computing device to access functionalities. An embodiment method may include operations for receiving in the computing device a signal from a proximity beacon device, obtaining from the received signal information that indicates whether the proximity beacon device has detected movement, determining whether the obtained information matches stored data corresponding to the proximity beacon device, performing an abbreviated authentication operations for the computing device to access the functionalities when it is determined that the obtained information from the received signal matches the stored data, and performing a normal authentication operations for the computing device to access the functionalities when it is determined that the obtained information from the received signal does not match the stored data.
    Type: Application
    Filed: June 4, 2014
    Publication date: December 10, 2015
    Applicant: QUALCOMM Incorporated
    Inventors: Craig Matthew Brown, Joel Benjamin Linsky, Michael William Paddon, Craig William Northway
  • Publication number: 20150127927
    Abstract: Embodiments of the disclosure provide efficient hardware dispatching of concurrent functions in multicore processors, and related processor systems, methods, and computer-readable media. In one embodiment, a first instruction indicating an operation requesting a concurrent transfer of program control is detected in a first hardware thread of a multicore processor. A request for the concurrent transfer of program control is enqueued in a hardware first-in-first-out (FIFO) queue. A second instruction indicating an operation dispatching the request for the concurrent transfer of program control in the hardware FIFO queue is detected in a second hardware thread of the multicore processor. The request for the concurrent transfer of program control is dequeued from the hardware FIFO queue, and the concurrent transfer of program control is executed in the second hardware thread.
    Type: Application
    Filed: March 25, 2014
    Publication date: May 7, 2015
    Applicant: QUALCOMM INCORPORATED
    Inventors: Michael William Paddon, Erik Asmussen de Castro Lopo, Matthew Christian Duggan, Kento Tarui, Craig Matthew Brown
  • Publication number: 20140273949
    Abstract: System, apparatus, and methods are provided for protecting against malicious infrastructure in a wireless communication network. A system determines a trust metric for an access point and decides to avoid communication with the access point based on the trust metric for the access point. The trust metric may, for example, be a numeric value such as a probability of trustworthiness or a categorization of trustworthiness. The system may determine the trust metric by receiving a list of access points and their corresponding trust metrics and matching a potential access point to its listed trust metric. The system may try to avoid using an untrustworthy access point's services unless it deems the services important enough to risk the communication.
    Type: Application
    Filed: March 13, 2013
    Publication date: September 18, 2014
    Applicant: QUALCOMM Incorporated
    Inventors: Matthew C. DUGGAN, Michael William PADDON, Kento TARUI
  • Publication number: 20140267047
    Abstract: Methods, systems and devices for handling an inappropriate input method used on a text input device receiving a user input entered with a first input method active in the form of a first set of discrete interactions with the device. The text input device may receive the first user input through the first input method and a second input method. At least one of the first and second input methods provides a conversion of the first user input to a symbol associated with a character set not shown on the text input device. A first orthographical incompatibility between the first user input and at least one of the first input method and the second input method may be determined. An indication may be output that an inappropriate input method was used based on the orthographical incompatibility.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: QUALCOMM INCORPORATED
    Inventors: Michael William PADDON, Matthew Christian DUGGAN, Kento TARUI
  • Publication number: 20140280668
    Abstract: Methods and apparatus for providing resources for cloud storage may include accessing physical storage capacity on a device, connected to a network cloud, including a virtual primary storage disk and at least one virtual secondary storage disk having access to the physical storage capacity. In addition, the methods and apparatus may include dynamically updating the available storage capacity of the virtual secondary storage disk for network cloud storage based upon usage of the physical storage capacity by the virtual primary storage disk and the virtual secondary storage disk.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Applicant: QUALCOMM INCORPORATED
    Inventors: Craig Matthew BROWN, Michael William PADDON