Patents by Inventor Scott W. Li
Scott W. Li has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11934368Abstract: For categorizing encrypted data files, a processor determines a block cipher key length for a data file based on data file contents. The processor encrypts the data file with an encryption cipher using the block cipher key length. The processor further determines a data type for the encrypted data file from macroscopic artifacts of the encrypted data file.Type: GrantFiled: February 20, 2020Date of Patent: March 19, 2024Assignee: LENOVO (Singapore) PTE. LTD.Inventors: Robert J. Kapinos, Scott W. Li, Robert J. Norton, Russell Speight VanBlon
-
Patent number: 11636232Abstract: Apparatus, methods, and program products for selectively obscuring data being displayed is disclosed. One apparatus includes a processor and a memory that stores code executable by the processor. The code is executable by the processor to determine a security classification for data being displayed on a display and selectively obscure the data being displayed on the display based on the determined security classification for the data. Methods and computer program products that perform the operations and/or functions of the apparatus are also disclosed.Type: GrantFiled: May 5, 2020Date of Patent: April 25, 2023Assignee: Lenovo (Singapore) Ltd. Pte.Inventors: Robert J. Kapinos, Russell Speight VanBlon, Scott W. Li, Robert J. Norton
-
Patent number: 11444781Abstract: Apparatuses, methods, systems, and program products are disclosed for distributed trust authentication. An apparatus includes a processor and a memory that stores code executable by the processor. The code is executable by the processor to receive content for a recipient from a content provider. The code is executable by the processor to receive an indicator of the veracity of the received content from the recipient of the content. The indicator of veracity may attest to an authenticity of the received content and an identity of the content provider. The code is executable by the processor to create an entry for the recipient in a public data store to validate that the recipient received the content. The entry may include a digital signature for the recipient and the indicator of the veracity of the received content.Type: GrantFiled: February 20, 2020Date of Patent: September 13, 2022Assignee: Lenovo (Singapore) PTE. LTD.Inventors: Robert J. Kapinos, Robert J. Norton, Russell Speight VanBlon, Scott W. Li
-
Patent number: 11367440Abstract: An approach is provided that uses a digital assistant during an online meeting. The digital assistant receives a request to attend an online meeting at a scheduled date and time. The digital assistant is associated with a user that is invited to attend the online meeting. The digital assistant is automatically logged onto the online meeting over the computer network when the scheduled date and time arrive. During the online meeting, the digital assistant detects a voice command from one the human participants of the online meeting. The digital assistant detects that the voice command is detected to the digital assistant. The digital assistant then performs a function that corresponds to the detected voice command.Type: GrantFiled: September 6, 2019Date of Patent: June 21, 2022Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Robert J. Kapinos, Scott W. Li, Russell Speight VanBlon, Robert Norton
-
Patent number: 11343272Abstract: An approach is provided that transmits a compressed video file and a work unit to various clients, receiving, from at least one of the clients. A proof of work submission is received from one of the clients with the proof of work being a result of one or more computations performed by the client on a rendered form of the compressed video file. The approach determines whether the proof of work submission is acceptable. If the proof of work submission is acceptable, then a block is added to a set of blocks included in a blockchain.Type: GrantFiled: April 17, 2020Date of Patent: May 24, 2022Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Robert J. Kapinos, Robert Norton, Russell Speight VanBlon, Scott W. Li
-
Patent number: 11291411Abstract: An approach is provided that automatically adjusts a band of a wearable electronic device. The approach detects conditions, such as activity-based conditions and location-based conditions, and automatically adjusts the band of the wearable electronic device based on the detected conditions.Type: GrantFiled: March 19, 2018Date of Patent: April 5, 2022Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Russell S. VanBlon, Robert J. Kapinos, Timothy W. Kingsbury, Scott W. Li
-
Patent number: 11277402Abstract: An approach is provided that receives a login request from a selected user. The approach first authenticates the selected user using a unique user identifier and a password associated with the selected user. In response to a successful first authentication, the approach performs a second authentication of the selected user using a second factor authentication code that was included in the login request. The second authentication includes retrieval of an expected second factor authentication code using an index into a block of codes with the index and the block of codes both being associated with the selected user. The login request is allowed and the index is changed in response to the second factor authentication code matching the expected second factor authentication code. The login request is denied in response to the second factor authentication code failing to match the expected second factor authentication code.Type: GrantFiled: January 9, 2020Date of Patent: March 15, 2022Assignee: Levono (Singapore) Pte. Ltd.Inventors: Robert J. Kapinos, Robert Norton, Russell Speight VanBlon, Scott W. Li
-
Publication number: 20210350033Abstract: Apparatus, methods, and program products for selectively obscuring data being displayed is disclosed. One apparatus includes a processor and a memory that stores code executable by the processor. The code is executable by the processor to determine a security classification for data being displayed on a display and selectively obscure the data being displayed on the display based on the determined security classification for the data. Methods and computer program products that perform the operations and/or functions of the apparatus are also disclosed.Type: ApplicationFiled: May 5, 2020Publication date: November 11, 2021Inventors: Robert J. Kapinos, Russell Speight VanBlon, Scott W. Li, Robert J. Norton
-
Publication number: 20210342470Abstract: For secure attribute verification, a processor generates a plurality of hashes of a seed and a previous public group index. The processor further iteratively generates a public group index for each hash. The processor generates a one-time user identifier expressed as a hash chain of identifiers each based on one of the public group indexes. The processor verifies user attributes from the one-time user identifier.Type: ApplicationFiled: April 30, 2020Publication date: November 4, 2021Inventors: Igor Stolbikov, Jixin Feng, Scott W. Li
-
Patent number: 11159665Abstract: An approach is provided that hides a caller's telephone number and instead displays a user friendly string that acts as an alias for the caller's identity. The approach receives, from a caller using a calling device, an incoming call at a receiving device that is the information handling system such as a smart phone. The incoming call includes a set of textual metadata that includes an alias corresponding to caller as well as the caller's telephone number that corresponds to the calling device. The approach then displays, on a display screen accessible from the receiving device, the alias while inhibiting display of the caller telephone number, thus keeping the caller's actual telephone number hidden from the user of the receiving device.Type: GrantFiled: January 29, 2020Date of Patent: October 26, 2021Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Zhenglong Bai, Scott W. Li, Marco Alberto Gonzalez, Matthew Carl Etter
-
Publication number: 20210329027Abstract: An approach is provided that transmits a compressed video file and a work unit to various clients, receiving, from at least one of the clients. A proof of work submission is received from one of the clients with the proof of work being a result of one or more computations performed by the client on a rendered form of the compressed video file. The approach determines whether the proof of work submission is acceptable. If the proof of work submission is acceptable, then a block is added to a set of blocks included in a blockchain.Type: ApplicationFiled: April 17, 2020Publication date: October 21, 2021Inventors: Robert J. Kapinos, Robert Norton, Russell Speight VanBlon, Scott W. Li
-
Publication number: 20210266176Abstract: Apparatuses, methods, systems, and program products are disclosed for distributed trust authentication. An apparatus includes a processor and a memory that stores code executable by the processor. The code is executable by the processor to receive content for a recipient from a content provider. The code is executable by the processor to receive an indicator of the veracity of the received content from the recipient of the content. The indicator of veracity may attest to an authenticity of the received content and an identity of the content provider. The code is executable by the processor to create an entry for the recipient in a public data store to validate that the recipient received the content. The entry may include a digital signature for the recipient and the indicator of the veracity of the received content.Type: ApplicationFiled: February 20, 2020Publication date: August 26, 2021Inventors: Robert J. Kapinos, Robert J. Norton, Russell Speight VanBlon, Scott W. Li
-
Publication number: 20210263904Abstract: For categorizing encrypted data files, a processor determines a block cipher key length for a data file based on data file contents. The processor encrypts the data file with an encryption cipher using the block cipher key length. The processor further determines a data type for the encrypted data file from macroscopic artifacts of the encrypted data file.Type: ApplicationFiled: February 20, 2020Publication date: August 26, 2021Inventors: Robert J. Kapinos, Scott W. Li, Robert J. Norton, Russell Speight VanBlon
-
Publication number: 20210234951Abstract: An approach is provided that hides a caller's telephone number and instead displays a user friendly string that acts as an alias for the caller's identity. The approach receives, from a caller using a calling device, an incoming call at a receiving device that is the information handling system such as a smart phone. The incoming call includes a set of textual metadata that includes an alias corresponding to caller as well as the caller's telephone number that corresponds to the calling device. The approach then displays, on a display screen accessible from the receiving device, the alias while inhibiting display of the caller telephone number, thus keeping the caller's actual telephone number hidden from the user of the receiving device.Type: ApplicationFiled: January 29, 2020Publication date: July 29, 2021Inventors: Zhenglong Bai, Scott W. Li, Marco Alberto Gonzalez, Matthew Carl Etter
-
Patent number: 11076100Abstract: An approach is provided that receives, at a smartglasses device, a set of image data from a digital camera that is external to the smartglasses device. The approach further displays an image at the smartglasses based on the set of image data.Type: GrantFiled: March 31, 2017Date of Patent: July 27, 2021Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Russell S. VanBlon, Robert J. Kapinos, Timothy W. Kingsbury, Scott W. Li
-
Publication number: 20210218734Abstract: An approach is provided that receives a login request from a selected user. The approach first authenticates the selected user using a unique user identifier and a password associated with the selected user. In response to a successful first authentication, the approach performs a second authentication of the selected user using a second factor authentication code that was included in the login request. The second authentication includes retrieval of an expected second factor authentication code using an index into a block of codes with the index and the block of codes both being associated with the selected user. The login request is allowed and the index is changed in response to the second factor authentication code matching the expected second factor authentication code. The login request is denied in response to the second factor authentication code failing to match the expected second factor authentication code.Type: ApplicationFiled: January 9, 2020Publication date: July 15, 2021Inventors: Robert J. Kapinos, Robert Norton, Russell Speight VanBlon, Scott W. Li
-
Patent number: 11017811Abstract: An approach is provided that identifies a preferred words-per-minute corresponding to a user listening to an audio. The actual words-per-minute of a selected audio segment is determined and used to calculate a playback speed adjustment value based on the preferred words-per-minute and the actual words-per-minute. A playback speed is adjusted according to the calculated playback speed adjustment value and the audio segment is audibly played at the adjusted first playback speed.Type: GrantFiled: January 9, 2020Date of Patent: May 25, 2021Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Scott W. Li, Robert J. Kapinos, Russell Speight VanBlon, Robert Norton
-
Publication number: 20210075632Abstract: An approach is provided that uses a digital assistant to manage an online meeting. The approach operates by having the digital assistant receive a request to attend an online meeting at a scheduled date and time, with the digital assistant being associated with a user scheduled to attend the online meeting. The digital assistant is automatically logged onto the online meeting over the computer network when the scheduled date and time arrive. The digital assistant then manages the online meeting with management of the online meeting including opening a conferencing bridge that allows online users to participate in the online meeting.Type: ApplicationFiled: September 6, 2019Publication date: March 11, 2021Inventors: Robert J. Kapinos, Robert Norton, Scott W. Li, Russell Speight VanBlon
-
Publication number: 20210074284Abstract: An approach is provided that uses a digital assistant during an online meeting. The digital assistant receives a request to attend an online meeting at a scheduled date and time. The digital assistant is associated with a user that is invited to attend the online meeting. The digital assistant is automatically logged onto the online meeting over the computer network when the scheduled date and time arrive. During the online meeting, the digital assistant detects a voice command from one the human participants of the online meeting. The digital assistant detects that the voice command is detected to the digital assistant. The digital assistant then performs a function that corresponds to the detected voice command.Type: ApplicationFiled: September 6, 2019Publication date: March 11, 2021Inventors: Robert J. Kapinos, Scott W. Li, Russell Speight VanBlon, Robert Norton
-
Patent number: 10685102Abstract: An approach is disclosed that receives a gesture from a user at a locked touch enabled device. The gesture received includes both a notification selection and the user's fingerprint. An action is then performed at the device, with the action that is performed being based on the notification that was selected.Type: GrantFiled: December 18, 2017Date of Patent: June 16, 2020Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Russell S. VanBlon, Robert J. Kapinos, Timothy W. Kingsbury, Scott W. Li