Patents by Inventor Ronald P. Knapp
Ronald P. Knapp has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9646296Abstract: A mobile-to-mobile transaction method allows two mobile smartphones to engage in a private transaction between themselves. The two share the same transaction server using prearranged individual enrollments. These build a dynamic digital image of a colorgram with a selected shape that defines a colorgram matrix boundary. Authentication codes, merchant coupons, product advertisements, and browser uniform resource locator (URL) links for product information and ordering, one-time-password (OTP) seeds, initialization vectors, individual enrollment passwords, or password seeds are embedded and encrypted in each colorgram. The colorgram is sent to a first one of the mobile smartphones for its display to a collocated second one of the mobile smartphones. A transaction is authenticated between users based on a calculated expectation of what should be returned when it provides its own digital image of the colorgram displayed by the first mobile smartphone.Type: GrantFiled: September 26, 2014Date of Patent: May 9, 2017Assignee: METASEPIA, INCInventors: Kerry D. Brown, Ronald P. Knapp
-
Publication number: 20150019441Abstract: A mobile-to-mobile transaction method allows two mobile smartphones to engage in a private transaction between themselves. The two share the same transaction server using prearranged individual enrollments. These build a dynamic digital image of a colorgram with a selected shape that defines a colorgram matrix boundary. Authentication codes, merchant coupons, product advertisements, and browser uniform resource locator (URL) links for product information and ordering, one-time-password (OTP) seeds, initialization vectors, individual enrollment passwords, or password seeds are embedded and encrypted in each colorgram. The colorgram is sent to a first one of the mobile smartphones for its display to a collocated second one of the mobile smartphones. A transaction is authenticated between users based on a calculated expectation of what should be returned when it provides its own digital image of the colorgram displayed by the first mobile smartphone.Type: ApplicationFiled: September 26, 2014Publication date: January 15, 2015Applicant: CRYPTITE, LLCInventors: Kerry D. Brown, Ronald P. Knapp
-
Publication number: 20150012444Abstract: A peer-to-peer transaction security method includes authentication and identification steps for pushing an encrypted colorgram from a transaction server to a first personal trusted device. Such provides a visual key for user authentication. Persona descriptors may be included for user identification. A decryption of the colorgram is displayed on the first personal trusted device to be optically captured by a second personal trusted device. The image captured from the second personal trusted device is encrypted and uploaded to the transaction server. In some cases, the persona descriptors alone are used to build a composite rendering for identification of the first user by the second user. The second user clicks and returns an acceptance if they recognize the composite drawing as a reasonable persona of the first user.Type: ApplicationFiled: September 26, 2014Publication date: January 8, 2015Applicant: Cryptite, LLCInventors: Kerry D. Brown, Ronald P. Knapp
-
Patent number: 8868902Abstract: A transaction security process includes authentication and identification parts for pushing an encrypted colorgram for user authentication and persona descriptors for user identification from a transaction server to a first personal trusted device. A decryption of the colorgram is displayed on the first personal trusted device. An image is captured by a second personal trusted device. An encryption of the image captured from the second personal trusted device is uploaded to the transaction server. The persona descriptors are used to build a composite rendering for identification of the first user to the second user. The second user clicks “OK” if they recognize the composite drawing as a reasonable persona of the first user.Type: GrantFiled: July 1, 2013Date of Patent: October 21, 2014Assignee: Cryptite LLCInventors: Kerry D. Brown, Ronald P. Knapp
-
Publication number: 20140100973Abstract: A payment device presents a matrix barcode on a smartphone display screen for scanning by a merchant at a point-of-sale terminal. The consumer authenticates with their payment processor by logging in with their smartphone through a back channel. A successful log-in is rewarded with a matrix barcode the consumer can allow the merchant to scan if the particulars and price of the proposed transaction are acceptable. A transaction summary and request for approval arrive back at the consumer's smartphone through the back channel. Approval can be indicated by the entry of a user PIN code, and the transaction is complete.Type: ApplicationFiled: December 6, 2013Publication date: April 10, 2014Applicant: CRYPTITE, LLCInventors: Kerry D. Brown, RONALD P. KNAPP, RICHARD B. MAIN
-
Patent number: 8478990Abstract: A transaction security process includes authentication and identification parts for pushing an encrypted colorgram for user authentication and persona descriptors for user identification from a transaction server to a first personal trusted device. A decryption of the colorgram is displayed on the first personal trusted device. An image is captured by a second personal trusted device. An encryption of the image captured from the second personal trusted device is uploaded to the transaction server. The persona descriptors are used to build a composite rendering for identification of the first user to the second user. The second user clicks “OK” if they recognize the composite drawing as a reasonable persona of the first user.Type: GrantFiled: June 2, 2011Date of Patent: July 2, 2013Assignee: Cryptite LLCInventors: Kerry D. Brown, Michael Keith Bond, Ronald P. Knapp, Peter Landrock
-
Publication number: 20120311320Abstract: A transaction security process includes authentication and identification parts for pushing an encrypted colorgram for user authentication and persona descriptors for user identification from a transaction server to a first personal trusted device. A decryption of the colorgram is displayed on the first personal trusted device. An image is captured by a second personal trusted device. An encryption of the image captured from the second personal trusted device is uploaded to the transaction server. The persona descriptors are used to build a composite rendering for identification of the first user to the second user. The second user clicks “OK” if they recognize the composite drawing as a reasonable persona of the first user.Type: ApplicationFiled: June 2, 2011Publication date: December 6, 2012Inventors: Kerry D. Brown, Michael Keith Bond, Ronald P. Knapp, Peter Landrock
-
Publication number: 20120278241Abstract: Data and financial transactions are secured on a mobile electronics device for traceability and non-repudiation. A mobile personal trusted device (PTD) is needed to communicate over a network to a transaction server. Characteristic abstracts of objects carried by users have distinctive features that can be associated with and registered to a particular user and are recorded. An abstract contemporaneously obtained during a secure transaction is sent to a server for use as an authenticator for comparison to an abstract previously obtained and registered to said user. A traceable transaction record is rendered that is highly identifiable and substantially indisputable.Type: ApplicationFiled: July 14, 2012Publication date: November 1, 2012Inventors: Kerry D. Brown, Peter Landrock, Ronald P. Knapp
-
Patent number: 8224293Abstract: A security system includes a software application running in a user's smartphone and a separately carried visual key that the user can image at will with the smartphone's camera. An effective visual key would typically comprise digital data encoded in a series of colored cells arranged in a colorgram. Such digital data is treated as a what-you-have security factor, and is concatenated with other security factors so users can authenticate themselves to websites, internet services, and even within the smartphone device itself or its applications. In one aspect, when users authenticate themselves to a server, the server returns a short-term supply of one-time-passwords or account numbers for use in secure access and financial transactions on other systems.Type: GrantFiled: December 31, 2010Date of Patent: July 17, 2012Inventors: Ronald P. Knapp, Kerry D. Brown, Peter Landrock
-
Publication number: 20120171997Abstract: A security system includes a software application running in a user's smartphone and a separately carried visual key that the user can image at will with the smartphone's camera. An effective visual key would typically comprise digital data encoded in a series of colored cells arranged in a colorgram. Such digital data is treated as a what-you-have security factor, and is concatenated with other security factors so users can authenticate themselves to websites, internet services, and even within the smartphone device itself or its applications. In one aspect, when users authenticate themselves to a server, the server returns a short-term supply of one-time-passwords or account numbers for use in secure access and financial transactions on other systems.Type: ApplicationFiled: December 31, 2010Publication date: July 5, 2012Inventors: Ronald P. Knapp, Kerry D. Brown, Peter Landrock