Patents by Inventor Oliver Michaelis

Oliver Michaelis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110018731
    Abstract: A method for communicating control information by a wearable device is disclosed. The method includes determining a first movement according to a first degree of freedom as being gesture-related and a second movement according to a second degree of freedom as being gesture-related; generating a first set of possibly performed gestures based on the first movement; generating a second set of possibly performed gestures based on the second movement; inferring, from the first and second sets, whether the first movement is representative of an intended command; and transmitting information based on the inference. An apparatus for performing the method is also disclosed.
    Type: Application
    Filed: March 12, 2010
    Publication date: January 27, 2011
    Applicant: QUALCOMM Incorporated
    Inventors: Joel Benjamin Linsky, Oliver Michaelis, Manuel Eduardo Jaime
  • Publication number: 20090076912
    Abstract: Providing for management of a dynamic mobile coupon (DMC) at a mobile device is described herein. Particularly, dynamic characteristics associated with the DMC, such as a redeemable value, can be utilized to browse, sort, search, recall, or redeem the DMC utilizing a user interface of the mobile device. In other aspects, a DMC management application can interact with server components to backup and store DMC data, synchronize dynamic information (e.g., a dynamic redeemable value), access or manage a user profile, interface with other mobile devices to accomplish sharing, trading, exchanging, selling the DMC, and so on. Accordingly, provided is an efficient and personable way to manage mobile coupons in a mobile operating environment and provide increased value and utility for a user of such coupons.
    Type: Application
    Filed: June 19, 2008
    Publication date: March 19, 2009
    Inventors: Rajeev D. RAJAN, Kamran MOALLEMI, Michal James KOENIG, Oliver MICHAELIS, Paul E. JACOBS, Jose Ricardo DOS SANTOS
  • Publication number: 20090061884
    Abstract: Dynamic mobile coupons (DMCs) having a variable commercial value and/or other variable coupon characteristic are provided herein. By way of example, a DMC can be distributed to a mobile device based on criteria established by a sponsor of the DMC. A redemption value of the DMC can be variable and dynamically established based at least in part on data associated with a recipient mobile device. Upon redemption of the DMC at a retail entity, the value is fixed and applied to a transaction. Details of the transaction are provided to a remote clearinghouse that performs mediation and indemnification functions to finalize the transaction. As described, the subject disclosure provides a DMC that facilitates a rich and flexible mechanism to generate purchasing incentive for consumers in a mobile environment.
    Type: Application
    Filed: June 19, 2008
    Publication date: March 5, 2009
    Inventors: Rajeev D. Rajan, Kamran Moallemi, Michal James Koenig, Oliver Michaelis, Paul E. Jacobs, Jose Ricardo Dos Santos, Dang Minh Vo
  • Publication number: 20080262928
    Abstract: A method and system for distributing and personalizing E-Coupons include sending a generic E-Coupon identifier to a mobile device and requesting a redeemable personalized E-Coupon based on the generic E-Coupon identifier. User location, time, purchase history and preference may be provided and used to personalize the E-Coupon. The personalized E-Coupon may then be distributed to the mobile device. The generic E-Coupon identifier may be distributed through different media, such as audio, video, multimedia or wireless data networks. For high security devices, the personalized E-Coupon may be sent digitally signed. For low security devices, the E-Coupon Manager may store the personalized E-Coupon and send to the mobile device a unique E-Coupon ID. The distributed personalized E-Coupons may be used to receive discounts at a merchant physical location or Internet site.
    Type: Application
    Filed: April 17, 2008
    Publication date: October 23, 2008
    Inventor: Oliver MICHAELIS
  • Patent number: 7430602
    Abstract: Multimode mobile station includes mobile configuration manager, device interface, and network interface to dynamically provision network configuration for mobile TE2-type mobile terminals and accomodates multiple protocols over multiple carrier access methods over Um interface and multiple access methods over Rm interface. A method for communicating between endpoints, where a mobile node obtains a unique configuration from a network for a managed device. The mobile node dynamically provisions the configuration for the connected managed device, in response to device request or network notice. The node adapts messages over Rm interface for TE2 signals and over Um interface for a wireless protocol.
    Type: Grant
    Filed: July 9, 2003
    Date of Patent: September 30, 2008
    Assignee: QUALCOMM Incorporated
    Inventors: Uppinder S. Babbar, Marcello Lioy, Nischal Abrol, Oliver Michaelis
  • Publication number: 20080222711
    Abstract: Devices and methods use close range communication links, e.g., near field communication (NFC) links, to authenticate communication devices to one another to create or join a new device to a trust domain. Once two devices establish a close range communication peer-to-peer link the devices exchange credential information that provide an infrastructure for the trust domain. Medium or long range wireless or wired network communication links can then be used for secure and trusted communications. Proximity limits of the close range communication P2P link enables mutual trust to be presumed among devices, providing added security to the process of extending a trust domain and reducing the need for security and authentication signaling. Embodiments provide a variety of methods for extending credential infrastructure among devices. Embodiments further enable simple to use virtual cables that can provide secure point-to-point communications that are configured merely by touching two communication devices together.
    Type: Application
    Filed: February 21, 2008
    Publication date: September 11, 2008
    Inventor: Oliver Michaelis
  • Publication number: 20080219227
    Abstract: Devices and methods use close range communication links, such as near field communication (NFC) protocol links, to enable users to authenticate mobile devices to one another to create or expand secure multicast groups. Once the two or more devices establish a close range communication peer-to-peer link the devices exchange multicast group communication data sufficient to permit the devices to receive or send multicast messages. Long range wireless or wired network communication links are then used for multicast message communications. Proximity limits of the close range communication P2P link enables mutual trust to be presumed among devices, reducing the need for security and authentication signaling. The limited range of close range communication P2P links renders multicast groups established in this manner less vulnerable to eavesdropping and intrusion. Embodiments enable users to initiate secure multicast group participation merely by bringing two or more devices into close proximity.
    Type: Application
    Filed: February 21, 2008
    Publication date: September 11, 2008
    Inventor: Oliver Michaelis
  • Publication number: 20080220878
    Abstract: Devices and methods use a close range communication link, such as a near field communication (NFC) protocol link, to enable users to establish multiplayer gaming sessions conducted over a second communication link different from the close range link. Once two or more gaming devices are brought close enough together to establish a close range peer-to-peer communications link, the devices exchange gaming information that allows the devices to synchronize or otherwise initiate or join the game session. The devices may also exchange communication information useful for establishing the second communications link or for further game synchronization. Embodiments enable users to initiate or join multiplayer gaming sessions merely by bringing two or more game devices into close proximity.
    Type: Application
    Filed: February 22, 2008
    Publication date: September 11, 2008
    Inventor: Oliver Michaelis
  • Publication number: 20070192610
    Abstract: Techniques to securely boot up an electronics device (e.g., a cellular phone) from an external storage device are described. Secure data (e.g., a hash digest, a signature, a cryptographic key, and so on) is initially retrieved from a non-writable area of an external memory device (e.g., an one-time programmable (OTP) area of a NAND Flash device). A first program (e.g., a boot program) is retrieved from a writable or main area of the external memory device and authenticated based on the secure data. The first program is enabled for execution if authenticated. A second program may be retrieved from the main area of the external memory device and authenticated based on the secure data. The second program is enabled for execution if authenticated. Additional programs may be retrieved and authenticated. Each program may be authenticated using a secure hash function, a digital signature, and/or some other cryptographic technique.
    Type: Application
    Filed: February 10, 2006
    Publication date: August 16, 2007
    Inventors: Dexter Chun, Ajit Patil, Cuneyt Fitoz, Dwight Gordon, Yu-Hsiang Huang, Oliver Michaelis
  • Publication number: 20060236098
    Abstract: Embodiments describe a system and/or method for multiple party digital signatures. According to a first aspect a method comprises establishing a first validity range for a first key, establishing a first validity range for at least a second key, and determining if the validity range of the first key overlaps the first validity range of the at least a second key. A certificate is signed with the first validity range of the first key and the first validity range of the at least a second key if the validity ranges overlap. According to another embodiment, signage of the certificate is refused if the first validity range of the first key does not overlap with the first validity range of the at least a second key.
    Type: Application
    Filed: July 15, 2005
    Publication date: October 19, 2006
    Inventors: Alexander Gantman, Aram Perez, Gregory Rose, Laurence Lundblade, Matthew Hohlfeld, Michael Paddon, Oliver Michaelis, Ricardo Lopez
  • Patent number: 7065367
    Abstract: This disclosure is directed to techniques for selection of wireless network interfaces for data communication within an access terminal. The techniques may rely on a set of interface selection rules to identify network interfaces that are eligible to serve a particular communication application or the type of traffic forwarded on behalf of another device. In addition, each network interface may be assigned a priority. Upon identifying eligible interfaces, e.g., interfaces that satisfy all of the interface selection rules, the techniques may involve selection of the eligible interface having the highest priority. The assigned priority may be dynamically adjusted based on the connection state of the interfaces, prioritization according to changes in system latency, interface cost, and the like.
    Type: Grant
    Filed: July 11, 2002
    Date of Patent: June 20, 2006
    Inventors: Oliver Michaelis, Marcello Lioy
  • Publication number: 20050246523
    Abstract: A Management System (MS) manages signing privileges for entities desiring cryptographic signatures, and a Certificate Authority (CA) provides a cryptographic signing service. MS registers entities for the cryptographic signing service, determines signing privileges for each entity, and processes requests from entities for signatures. For registration, MS obtains registration information for the entity and invokes CA to generate an identity certificate for the entity. This identity certificate contains cryptographic information used to uniquely identify the entity. For signature generation, MS receives a request for a signature from the entity, authenticates the entity, authorizes or denies the request based on the signing privileges stored for the entity, and invokes CA to generate the signature if the signature is authorized. CA provides the cryptographic signing service and generates signatures and certificates as directed by MS.
    Type: Application
    Filed: April 30, 2004
    Publication date: November 3, 2005
    Inventors: Anthony Mauro, Oliver Michaelis
  • Publication number: 20050117546
    Abstract: For Mobile IP supporting inter-technology handoffs, a logical interface is provided at an abstraction layer, which resides between a network layer and a link layer. The logical interface performs processing to provide an interface between the network layer and the link layer, but communicates with physical interfaces instead of directly with the link layer. One physical interface is provided for each communication network (e.g., each radio network of a different wireless technology). Each physical interface performs technology-dependent processing for the associated communication network and communicates with a respective link layer module. Each link layer module performs link layer processing for the associated communication network. The logical interface is associated with one physical interface at any given moment. The logical interface is also associated with an IP address that does not change and is used by IP in the network layer for communication with the multiple communication networks.
    Type: Application
    Filed: December 2, 2003
    Publication date: June 2, 2005
    Inventors: Marcello Lioy, Nischal Abrol, Oliver Michaelis, Uppinder Babbar
  • Publication number: 20040116140
    Abstract: Multimode mobile station includes mobile configuration manager, device interface, and network interface to dynamically provision network configuration for mobile TE2-type mobile terminals and accomodates multiple protocols over multiple carrier access methods over Um interface and multiple access methods over Rm interface. A method for communicating between endpoints, where a mobile node obtains a unique configuration from a network for a managed device. The mobile node dynamically provisions the configuration for the connected managed device, in response to device request or network notice. The node adapts messages over Rm interface for TE2 signals and over Um interface for a wireless protocol.
    Type: Application
    Filed: July 9, 2003
    Publication date: June 17, 2004
    Inventors: Uppinder S. Babbar, Marcello Lioy, Nischal Abrol, Oliver Michaelis
  • Publication number: 20040009751
    Abstract: This disclosure is directed to techniques for selection of wireless network interfaces for data communication within an access terminal. The techniques may rely on a set of interface selection rules to identify network interfaces that are eligible to serve a particular communication application or the type of traffic forwarded on behalf of another device. In addition, each network interface may be assigned a priority. Upon identifying eligible interfaces, e.g., interfaces that satisfy all of the interface selection rules, the techniques may involve selection of the eligible interface having the highest priority. The assigned priority may be dynamically adjusted based on the connection state of the interfaces, prioritization according to changes in system latency, interface cost, and the like.
    Type: Application
    Filed: July 11, 2002
    Publication date: January 15, 2004
    Inventors: Oliver Michaelis, Marcello Lioy