Patents by Inventor Scott Blum

Scott Blum has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250225274
    Abstract: Systems and methods related to normalization of runtime data for algorithm training in a zero-trust computing environment are provided. The data set is first projected into a feature space using at least one transform model, and used to extract identified features of a dataset, yielding a pre-processed dataset before subsequent runtime algorithm consumption. Systems and methods are also presented for algorithm certification in a zero-trust computing environment, and report generation in a zero-trust computing environment. In yet another embodiment, systems and methods for processing data using a foundational model for data curation are provided. These systems and methods enable more efficient algorithm deployment and operation.
    Type: Application
    Filed: March 28, 2025
    Publication date: July 10, 2025
    Inventors: Michael Scott Blum, Mary Elizabeth Chalk, Alan Donald Czeszynski, Sudish Mogli, Robert Derward Rogers
  • Publication number: 20250068766
    Abstract: Systems and methods for distributed key generation is provided. In some embodiments, a public key and a private key are generated using elliptical curve cryptography (ECC) at a group of trusted parties. In some cases, an elliptical curve digital signature algorithm may be employed. Each party also generates a commitment and a blinding factor. The blinding factor may be a randomized polynomial integer. The parties use the commitments from the other parties to validate the public keys before receipt and combining the public keys into a group/aggregate public key. Content encryption keys (CEK) are then encrypted at each of the trusted parties using these aggregate public keys to generate wrapped content encryption keys (WCEK). Private keys are sharded and a sharded private key is generated at each party using the pieces of shards received by the trusted party. Subsequently, criteria may be received that allows for the release of these sharded private keys back to a trusted environment/enclave.
    Type: Application
    Filed: November 8, 2024
    Publication date: February 27, 2025
    Inventors: Pavan Gupta, Michael Scott Blum, Mary Elizabeth Chalk, Robert Derward Rogers, Syam Babu Malampati, Sudish Mogli, Kurian Davy Manavalan, Taljinder Kaur
  • Publication number: 20250053687
    Abstract: Systems and methods for the generation and usage of an identifier determiner model is provided. The identifier determiner model is generated in a sequestered computing node by receiving an untrained foundational model and a data set. The data set is bifurcated into a raw set and a de-identified set. The untrained foundational model is then tuned using the de-identified set to generate a sanitized model and the raw set to generate a raw model. Queries are presented to the raw model and the sanitized model to generate outputs. The identifier determiner machine learning model is generated by using the outputs to classify information as either sensitive or non-sensitive. The system may then receive a new foundational model. The identifier determiner machine learning model may be applied to outputs of this new foundational model to filter out sensitive information, either through redaction, or preventing them from being asked.
    Type: Application
    Filed: August 8, 2024
    Publication date: February 13, 2025
    Inventors: Michael Scott Blum, Mary Elizabeth Chalk, Robert Deward Rogers, Alan Donald Czeszynski, Sudish Mogli
  • Patent number: 11593343
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for clustering user interface event data for analysis and retrieval are disclosed. In one aspect, a system includes a data store and computer(s) that interact with the data store and execute instructions that cause the computer(s) to receive, for a user interface event, event data specifying a structure of a user interface presented during the user session. The event is assigned to a respective cluster based on a comparison of the structure of the user interface specified by the event data to a user interface structure that represents the respective cluster. For each cluster, a user interface attribute indicative of a user interface state of user interfaces specified by the event data in the cluster is determined. User interface state groups are generated based on the user interface attribute for each cluster.
    Type: Grant
    Filed: June 22, 2020
    Date of Patent: February 28, 2023
    Assignee: FullStory, Inc.
    Inventors: Jaime Michael Yap, Joel Grayson Webber, Hollis Bruce Johnson, Jr., Andrew Scott Blum
  • Patent number: 10762130
    Abstract: A method and system for combining user-defined music, sound effects or other audio content selections with video or other media, an activity or an event experience. Music attributes are associated with music files. A user selects a music category. Video or other media are time segmented. Each segment is associated with the music attributes. Using a time clock, music in the user-selected category is combined with video for a personalized experience.
    Type: Grant
    Filed: July 25, 2019
    Date of Patent: September 1, 2020
    Assignee: Omfit LLC
    Inventor: Scott Blum
  • Patent number: 10691664
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for clustering user interface event data for analysis and retrieval are disclosed. In one aspect, a system includes a data store and computer(s) that interact with the data store and execute instructions that cause the computer(s) to receive, for a user interface event, event data specifying a structure of a user interface presented during the user session. The event is assigned to a respective cluster based on a comparison of the structure of the user interface specified by the event data to a user interface structure that represents the respective cluster. For each cluster, a user interface attribute indicative of a user interface state of user interfaces specified by the event data in the cluster is determined. User interface state groups are generated based on the user interface attribute for each cluster.
    Type: Grant
    Filed: February 14, 2018
    Date of Patent: June 23, 2020
    Assignee: FullStory, Inc.
    Inventors: Jaime Michael Yap, Joel Grayson Webber, Hollis Bruce Johnson, Jr., Andrew Scott Blum
  • Publication number: 20200034385
    Abstract: A method and system for combining user-defined music, sound effects or other audio content selections with video or other media, an activity or an event experience. Music attributes are associated with music files. A user selects a music category. Video or other media are time segmented. Each segment is associated with the music attributes. Using a time clock, music in the user-selected category is combined with video for a personalized experience.
    Type: Application
    Filed: July 25, 2019
    Publication date: January 30, 2020
    Applicant: Omfit LLC
    Inventor: Scott Blum
  • Publication number: 20170060810
    Abstract: A vehicle system and method are disclosed for the acquisition and transformation of data from vehicle mounted sensors oriented to monitor the environment proximate the vehicle for relevant objects. Data transformations are accomplished using polar to Cartesian debiased corrections, recursive filters, and measurement-to-track update techniques.
    Type: Application
    Filed: December 13, 2012
    Publication date: March 2, 2017
    Inventors: Dan Alan Preston, Joseph David Preston, Rick Scott Blum, Thomas August Manos, Kenneth Schofield
  • Patent number: 8452012
    Abstract: A system and method for establishing a connection on a mobile computing device includes generating a secret on a trusted platform of the mobile computing device. The secret is transported to a subscriber identity module (SIM)/Smartcard on the mobile computing device. A secure local communication channel is established between the trusted platform and the SIM/Smartcard using the secret.
    Type: Grant
    Filed: September 16, 2011
    Date of Patent: May 28, 2013
    Assignee: Intel Corporation
    Inventors: Selim Aissi, Sundeep Bajikar, Sameer Abhinkar, Scott Blum, Jane Dashevsky, Abhay Dharmadhikari, Benjamin Matasar, Mrudula Yelamanchi
  • Patent number: 8417490
    Abstract: A system and methods are disclosed for providing integrated software development environment for the design, verification and validation of advanced automotive safety systems. The system allows automotive software to be developed on a host computer using a collection of computer programs running simultaneously as processes and synchronized by a central process. The software disclosed uses separate synchronized processes, permitting signals from disparate sources to be generated by a simulation running on the host computer or from actual sensors and data bus signals coming from and going to actual vehicle hardware which is connected to their bus counterparts in the host computer on a real-time basis. The methods disclosed are for providing an Algorithm Prototyping, Analysis and Test through an integrated framework for dynamic data modeling and application development.
    Type: Grant
    Filed: May 11, 2010
    Date of Patent: April 9, 2013
    Assignee: Eagle Harbor Holdings, LLC
    Inventors: Dan Preston, Joseph David Preston, Rick Scott Blum, Thomas August Manos, Kenneth Schofield
  • Publication number: 20120027209
    Abstract: A system and method for establishing a connection on a mobile computing device includes generating a secret on a trusted platform of the mobile computing device. The secret is transported to a subscriber identity module (SIM)/Smartcard on the mobile computing device. A secure local communication channel is established between the trusted platform and the SIM/Smartcard using the secret.
    Type: Application
    Filed: September 16, 2011
    Publication date: February 2, 2012
    Inventors: Selim Aissi, Sundeep Bajikar, Sameer Abhinkar, Scott Blum, Jane Dashevsky, Abhay Dharmadhikari, Benjamin Matasar, Mrudula Yelamanchi
  • Patent number: 8027472
    Abstract: A system and method for establishing a connection on a mobile computing device. A secret is generated on a trusted platform of the mobile computing device. The secret is transported to a secure channel application. The secure channel application establishes a trusted local communication channel between the trusted platform and a SIM (subscriber identity module)/Smartcard. The secret is received by the SIM/Smartcard. The secret, after being received by the SIM/Smartcard, is provided to a secure channel applet on the SIM/Smartcard. The secure channel applet establishes the trusted local communication channel between the SIM/Smartcard and the trusted platform, wherein the secret is shared by the trusted platform and the SIM/Smartcard.
    Type: Grant
    Filed: December 30, 2005
    Date of Patent: September 27, 2011
    Inventors: Selim Aissi, Sundeep Bajikar, Sameer Abhinkar, Scott Blum, Jane Dashevsky, Abhay Dharmadhikari, Benjamin Matasar, Mrudula Yelamanchi
  • Patent number: 7624428
    Abstract: An apparatus and method for platform and device independent identity manageability. In one embodiment, the method includes validation of a manageable identity (MID) held within trusted storage of a user platform according to a user request to move the MID to a target platform. Once the MID is validated, available resources of the target platform are verified according to resource requirements of the MID. Once verified, the MID may be moved from the user platform to trusted storage provided by the target platform. In one embodiment, a platform-independent MID may be established that may be moved from a user platform to a non-compatible target platform, such that the platform-independent MID is not constrained to just one single platform. Other embodiments are described and claimed.
    Type: Grant
    Filed: June 30, 2005
    Date of Patent: November 24, 2009
    Assignee: Intel Corporation
    Inventors: Sameer Abhinkar, Selim Aissi, Jane Dashevsky, Abhay Dharmadhikari, Benjamin J. Matasar, Mrudula Yelamanchi, Scott Blum, Shelagh Ann Callahan
  • Publication number: 20070283449
    Abstract: A content display system for displaying downloaded locked content that has associated launch parameters. The system includes a media player that includes a download module for downloading content from a content provider over a network, a storage module for storing the downloaded content in a cache memory and a launch module for determining whether the associated launch parameters have been met. The launch module unlocks the content if the launch parameters have been met so that the content may be accessed by a user.
    Type: Application
    Filed: April 20, 2007
    Publication date: December 6, 2007
    Inventors: Scott Blum, Andy Leak, Geoff Schreiber
  • Publication number: 20070239611
    Abstract: A subscription content management and display system and method is provided in which subscription content is loaded into a local or otherwise designated memory for access by a user as desired. Optional subscription verification modules and period determination modules are provided controlling access to the content and loading at determined intervals.
    Type: Application
    Filed: April 5, 2007
    Publication date: October 11, 2007
    Inventor: Scott Blum
  • Publication number: 20070239546
    Abstract: A system and method of interactive advertising is provided in which an interactive media player is configured to allow user interaction as media having advertising is played. User interaction, such as by clicking a watermark, sends a signal with identifying information. Clicking the watermark and sending the signal does not interrupt the operation of the media player, such as by stopping the display of the content or opening another browser window. The user may selectively respond to advertisements and a user profile may be created based on the responses and/or the content that is played.
    Type: Application
    Filed: April 5, 2007
    Publication date: October 11, 2007
    Inventors: Scott Blum, Andy Leak, Geoff Schreiber
  • Publication number: 20070154014
    Abstract: A system and method for establishing a trusted connection on a mobile computing device. A shared secret is generated on a trusted platform of the mobile computing device. The shared secret is transported to a secure channel application. The secure channel application establishes a secure local communication channel between the trusted platform and a SIM (subscriber identity module)/Smartcard on the mobile computing device. The shared secret is received by the SlM/Smartcard. In one embodiment, the mobile computing device includes a GSM (Global Systems for Mobile Communications) 03.48 application that sends the shared secret to a GSM 03.48 network infrastructure for storage, management, and verification by the GSM 03.48 network infrastructure, and in turn sends the shared secret to the SIM/Smartcard on the mobile computing device. In an alternative embodiment, a Diffie-Hellman key exchange is performed by the trusted platform to send the shared secret to the SIM/Smartcard.
    Type: Application
    Filed: December 30, 2005
    Publication date: July 5, 2007
    Inventors: Selim Aissi, Sundeep Bajikar, Sameer Abhinkar, Scott Blum, Jane Dashevsky, Abhay Dharmadhikari, Benjamin Matasar, Mrudula Yelamanchi
  • Publication number: 20070005966
    Abstract: Techniques and architectures that allow two electronic devices to derive a shared keystream from a shared secret. In one embodiment, each of the electronic devices generates a random number and transmits the random number to the other electronic device. Each electronic device may generate value by performing a hash on the shared secret and the two random numbers. The hash value may be used to generate a shared keystream.
    Type: Application
    Filed: June 30, 2005
    Publication date: January 4, 2007
    Inventors: Selim Aissi, Mrudula Yelamanchi, Sameer Abhinkar, Scott Blum, Jane Dashevsky, Abhay Dharmadhikari, Benjamin Matasar
  • Publication number: 20070006281
    Abstract: An apparatus and method for platform and device independent identity manageability. In one embodiment, the method includes validation of a manageable identity (MID) held within trusted storage of a user platform according to a user request to move the MID to a target platform. Once the MID is validated, available resources of the target platform are verified according to resource requirements of the MID. Once verified, the MID may be moved from the user platform to trusted storage provided by the target platform. In one embodiment, a platform-independent MID may be established that may be moved from a user platform to a non-compatible target platform, such that the platform-independent MID is not constrained to just one single platform. Other embodiments are described and claimed.
    Type: Application
    Filed: June 30, 2005
    Publication date: January 4, 2007
    Inventors: Sameer Abhinkar, Selim Aissi, Jane Dashevsky, Abhay Dharmadhikari, Benjamin Matasar, Mrudula Yelamanchi, Scott Blum, Shelagh Callahan
  • Publication number: 20060209858
    Abstract: A method and apparatus for intelligently bridging a first network and a second network are disclosed. In one embodiment, a protocol independent bridge device driver is bound to a first and a second network interface card device driver in order to access the first and the second network. Then the bridge device driver adaptively derives topology of the first and the second network based on network packets that it receives from the first and the second network. Lastly, the bridge device driver delivers the received network packets based on information contained in the received network packets and the derived topology.
    Type: Application
    Filed: January 11, 2006
    Publication date: September 21, 2006
    Inventor: Scott Blum