Patents by Inventor Samy Kamkar
Samy Kamkar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10445956Abstract: Secure handsfree two-stage access control is provided via a first stage that is performed when a mobile device is within a first distance from an access control reader, and a second stage that is performed when the mobile device is within a second distance from the reader, wherein the second distance is less than the first distance. Performing the first stage includes establishing a secure connection between the mobile device and the reader, and authorizing access for the mobile device to a secured resource. Performing the second stage includes providing access to the secured resource when the mobile device has been authorized to access the secured resource during the first stage, and the mobile device enters within the second distance from the reader. The second stage may be triggered in response to the reader detecting a user gesture or action.Type: GrantFiled: August 20, 2018Date of Patent: October 15, 2019Assignee: OPENPATH SECURITY INC.Inventors: Samy Kamkar, Jacqueline Mak, Cameron Kaye, Michael Biggs
-
Publication number: 20190272690Abstract: Secure handsfree proximity-based access control is provided by a system that includes one or more system devices located near different secured resources. Each system device may broadcast a changing unique identifier to user devices in wireless range of the system device. The system may also include an application that runs on each user device, and that obtains a signal strength measurement in response to receiving or detecting a current identifier advertised from a system device. The application may request access to a secured resource over one or more available wireless networks in response to satisfying the signal strength threshold. The system may include an access control unit that authorizes access to the secured resource based on the earliest arriving request, and further based on an identifier of the request matching to the current identifier, and the current identifier not having been previously used to obtain access to the secured resource.Type: ApplicationFiled: May 20, 2019Publication date: September 5, 2019Applicant: OpenPath Security Inc.Inventors: Cameron Kaye, Samy Kamkar, Alexander A. Kazerani
-
Patent number: 10370118Abstract: There is a remote control device or drone, which has software and a combination of lights or LED on an lighting ring or apparatus that can move independently of the drone; the drone can be programmed or be reactive to sound or other stimulus to create the effect of writing shapes or words in the air and typically at nighttime against a dark sky.Type: GrantFiled: October 31, 2016Date of Patent: August 6, 2019Inventors: Simon Saito Nielsen, Samy Kamkar
-
Publication number: 20190236869Abstract: Disclosed are systems and methods for performing entry access over two or more networks. The two or more networks are leveraged to accelerate the entry access and provide redundancy. Performance over each of the two or more networks is tracked in order to allow a mobile device to exchange entry access messaging over the particular network providing fastest start-to-unlock time. The mobile device can alternatively exchange the entry access messaging simultaneously over the two or more networks to create a race condition whereby the fastest start-to-unlock time is obtained without monitoring network performance. Performing the entry access messaging exchange over the two or more networks also ensures reliability in the event a particular network is down or congested, an authorization device on a particular network is down or overloaded, a radio of a mobile device communicating over a particular network is disabled or slow performing.Type: ApplicationFiled: April 10, 2019Publication date: August 1, 2019Applicant: OpenPath Security Inc.Inventors: Alexander A. Kazerani, Amir Reza Khakpour, Samy Kamkar, Robert J. Peters
-
Publication number: 20190172287Abstract: The solution is directed to access control systems and verifying proximity of a user to an access point that the user is wirelessly requesting access to. The proximity verification is based on placing proximity hubs adjacent to the different access points. Each proximity hub advertises a different unique identifier that changes periodically over a short-range wireless network and can be detected with a mobile device if the mobile device is physically within a short distance from the proximity hub. The unique identifier changes based on a rolling code. A user is permitted access to a restricted access point in response to the mobile device sending over a different long-range wireless network, the unique identifier advertised from a proximity hub adjacent to a desired access point and user access credentials authenticating access privileges of the user to the desired access point.Type: ApplicationFiled: September 28, 2018Publication date: June 6, 2019Applicant: OpenPath Security Inc.Inventors: Cameron Kaye, Samy Kamkar, Robert J. Peters, Alexander A. Kazerani
-
Patent number: 10304269Abstract: Disclosed are systems and methods for performing entry access over two or more networks. The two or more networks are leveraged to accelerate the entry access and provide redundancy. Performance over each of the two or more networks is tracked in order to allow a mobile device to exchange entry access messaging over the particular network providing fastest start-to-unlock time. The mobile device can alternatively exchange the entry access messaging simultaneously over the two or more networks to create a race condition whereby the fastest start-to-unlock time is obtained without monitoring network performance. Performing the entry access messaging exchange over the two or more networks also ensures reliability in the event a particular network is down or congested, an authorization device on a particular network is down or overloaded, a radio of a mobile device communicating over a particular network is disabled or slow performing.Type: GrantFiled: September 18, 2017Date of Patent: May 28, 2019Assignee: OPENPATH SECURITY INC.Inventors: Alexander A. Kazerani, Amir Reza Khakpour, Samy Kamkar, Robert J. Peters
-
Patent number: 10257708Abstract: One or more beaconing devices transmit synchronized changing beacons. The changing beacons trigger execution of an application that is installed but closed or not running on a mobile device, that is in wireless beaconing range of a beaconing device, and that has registered the changing beacons with the mobile device operating system (“OS”) to trigger execution of the application upon receipt of the changing beacons. The changing beacons also keep the executing application running by resetting OS policies for closing the application when it is running with the mobile device in a locked or standby state. The application may perform different procedures and different times with the beaconing device or other devices including authorizing access to a secured resource when the mobile device is far away from the beaconing device, and confirming intent to access the secured resource when the mobile device is close to the beaconing device.Type: GrantFiled: August 20, 2018Date of Patent: April 9, 2019Assignee: OPENPATH SECURITY INC.Inventors: Samy Kamkar, Cameron Kaye, Jacqueline Mak
-
Publication number: 20190073468Abstract: Systems and methods for performing decoupled authorization, whereby authorizing access permissions of a user to a resource is performed separate and independent from authorizing intent of the user to access the resource. Once both authorizations are successfully completed within a specified timeout interval, the access state of the resource is changed, thereby granting the user access to the resource. The decoupled authorizations are independently performed over different networks, in response to different triggers, or by leveraging different hardware. Access to the resource can therefore be provided prior to the user arriving before the resource, with little to no action by the user, and without comprising security as the resources will remain restricted or locked if the either of the user's intent or access permissions cannot be verified.Type: ApplicationFiled: September 5, 2017Publication date: March 7, 2019Applicant: OpenPath Security Inc.Inventors: Alexander A. Kazerani, Robert J. Peters, Samy Kamkar
-
Publication number: 20190073846Abstract: Secure handsfree two-stage access control is provided via a first stage that is performed when a mobile device is within a first distance from an access control reader, and a second stage that is performed when the mobile device is within a second distance from the reader, wherein the second distance is less than the first distance. Performing the first stage includes establishing a secure connection between the mobile device and the reader, and authorizing access for the mobile device to a secured resource. Performing the second stage includes providing access to the secured resource when the mobile device has been authorized to access the secured resource during the first stage, and the mobile device enters within the second distance from the reader. The second stage may be triggered in response to the reader detecting a user gesture or action.Type: ApplicationFiled: August 20, 2018Publication date: March 7, 2019Applicant: OpenPath Security Inc.Inventors: Samy Kamkar, Jacqueline Mak, Cameron Kaye, Michael Biggs
-
Publication number: 20180285089Abstract: Disclosed are systems and methods for updating a distributed system device with an update that a system controller fragments and propagates to the system device by way of two or more third party clients. The system controller manages client access rights to a service accessible at different distributed system devices. The system controller has first network connectivity with which to remotely distribute different fragments of an update to different clients. Each system device controls access to the service at different a site and has (i) second network connectivity with which the different clients propagate different fragments of the update to the system device upon entering communication range with the system device, (ii) memory storing different sets of fragments for the update based on different times at which the clients propagate the fragments, and (iii) a processor applying the update once all fragments of the update to the memory.Type: ApplicationFiled: April 4, 2017Publication date: October 4, 2018Inventors: Amir Reza Khakpour, Alexander A. Kazerani, Samy Kamkar, Robert J. Peters
-
Patent number: 10089810Abstract: The solution is directed to access control systems and verifying proximity of a user to an access point that the user is wirelessly requesting access to. The proximity verification is based on placing proximity hubs adjacent to the different access points. Each proximity hub advertises a different unique identifier that changes periodically over a short-range wireless network and can be detected with a mobile device if the mobile device is physically within a short distance from the proximity hub. The unique identifier changes based on a rolling code. A user is permitted access to a restricted access point in response to the mobile device sending over a different long-range wireless network, the unique identifier advertised from a proximity hub adjacent to a desired access point and user access credentials authenticating access privileges of the user to the desired access point.Type: GrantFiled: December 1, 2017Date of Patent: October 2, 2018Assignee: OPENPATH SECURITY INC.Inventors: Cameron Kaye, Samy Kamkar, Robert J. Peters, Alexander A. Kazerani
-
Publication number: 20180253917Abstract: Disclosed are systems and methods for performing entry access over two or more networks. The two or more networks are leveraged to accelerate the entry access and provide redundancy. Performance over each of the two or more networks is tracked in order to allow a mobile device to exchange entry access messaging over the particular network providing fastest start-to-unlock time. The mobile device can alternatively exchange the entry access messaging simultaneously over the two or more networks to create a race condition whereby the fastest start-to-unlock time is obtained without monitoring network performance. Performing the entry access messaging exchange over the two or more networks also ensures reliability in the event a particular network is down or congested, an authorization device on a particular network is down or overloaded, a radio of a mobile device communicating over a particular network is disabled or slow performing.Type: ApplicationFiled: September 18, 2017Publication date: September 6, 2018Applicant: OpenPath Security Inc.Inventors: Alexander A. Kazerani, Amir Reza Khakpour, Samy Kamkar, Robert J. Peters
-
Patent number: 9963921Abstract: Provided is an access control electro-permanent magnetic lock for locking and unlocking physical barriers with electromagnetism, but without a continual power source. The lock comprises permanent magnets juxtaposed with electro-permanent magnets. The polarity of the permanent magnets is fixed and aligned. The polarity of the electro-permanent magnets can be switched by introducing a pulse of electric current for a fraction of a second at low voltage to the electro-permanent magnets. A strong magnetic field generating a locking or holding force is produced when the polarity of the electro-permanent magnets aligns with or is in the same direction as the polarity of the permanent magnets. The magnetic field is canceled such that there is no locking or holding force when the polarity of the electro-permanent magnets is opposite to the polarity of the permanent magnets. The lock can further provide fail-secure or fail-safe protections in the event of power loss.Type: GrantFiled: August 17, 2017Date of Patent: May 8, 2018Assignee: OPENPATH SECURITY INC.Inventors: Samy Kamkar, Robert J. Peters, Alexander A. Kazerani
-
Patent number: 9767630Abstract: Disclosed are systems and methods for performing entry access over two or more networks. The two or more networks are leveraged to accelerate the entry access and provide redundancy. Performance over each of the two or more networks is tracked in order to allow a mobile device to exchange entry access messaging over the particular network providing fastest start-to-unlock time. The mobile device can alternatively exchange the entry access messaging simultaneously over the two or more networks to create a race condition whereby the fastest start-to-unlock time is obtained without monitoring network performance. Performing the entry access messaging exchange over the two or more networks also ensures reliability in the event a particular network is down or congested, an authorization device on a particular network is down or overloaded, a radio of a mobile device communicating over a particular network is disabled or slow performing.Type: GrantFiled: March 2, 2017Date of Patent: September 19, 2017Assignee: OPENPATH SECURITY INC.Inventors: Alexander A. Kazerani, Amir Reza Khakpour, Samy Kamkar, Robert J. Peters
-
Patent number: 8780925Abstract: Systems and methods for utilizing a PBX identifier of a PBX system in a mobile environment are provided. In exemplary systems, an enhanced DNS server maintains a central registry of PBX identifiers and corresponding locations associated with the PBX identifiers. The corresponding locations may comprise both private and public IP address. When a remote IP device attempts to access their main office PBX system via the PBX identifier, the enhanced DNS server returns the private and public IP addresses in response.Type: GrantFiled: August 17, 2006Date of Patent: July 15, 2014Assignee: Fonality, Inc.Inventors: Adrian Otto, Samy Kamkar
-
Patent number: 8719386Abstract: Systems and methods for providing configuration synchronicity is provided. In exemplary embodiments, a configuration file is generated based on received configuration information. The configuration file may then be stored and queued up for download to at least one communication server to configure the communication server. Subsequently, a verification process is performed to confirm that the configuration file is correctly written to disk by the communication server.Type: GrantFiled: January 8, 2009Date of Patent: May 6, 2014Assignee: Fonality, Inc.Inventors: Christopher Lyman, Samy Kamkar
-
Publication number: 20140111432Abstract: An interactive music method for controlling a media player device is provided. The interactive music method comprises the steps of receiving one or more gestures, interpreting the gesture in accordance with a plurality of predefined gestures, and executing at least one process corresponding to the gesture. The process comprises controlling audio for a specific amount of time.Type: ApplicationFiled: October 22, 2012Publication date: April 24, 2014Applicant: SK Digital Gesture, Inc.Inventor: Samy Kamkar
-
Publication number: 20100174807Abstract: Systems and methods for providing configuration synchronicity is provided. In exemplary embodiments, a configuration file is generated based on received configuration information. The configuration file may then be stored and queued up for download to at least one communication server to configure the communication server. Subsequently, a verification process is performed to confirm that the configuration file is correctly written to disk by the communication server.Type: ApplicationFiled: January 8, 2009Publication date: July 8, 2010Inventors: Christopher Lyman, Samy Kamkar
-
Publication number: 20060256789Abstract: Systems and methods for utilizing a PBX identifier of a PBX system in a mobile environment are provided. In exemplary systems, an enhanced DNS server maintains a central registry of PBX identifiers and corresponding locations associated with the PBX identifiers. The corresponding locations may comprise both private and public IP address. When a remote IP device attempts to access their main office PBX system via the PBX identifier, the enhanced DNS server returns the private and public IP addresses in response.Type: ApplicationFiled: August 17, 2006Publication date: November 16, 2006Inventors: Adrian Otto, Samy Kamkar