Patents by Inventor Sean Moshir
Sean Moshir has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8965416Abstract: A system and method having a first software module of a server recorded on a computer-readable medium programmed to receive a request for information from a user. The user requests a purchase of a lottery ticket, information on lottery laws and regulations, and lottery winnings distribution information using at least one of a short code and a long code and a generic assigned identification. The system obtains a lottery ticket number, lottery laws and regulations, and lottery winnings distribution information requested by the user. The system send the lottery ticket number, lottery laws and regulations, and lottery winnings distribution information requested by the user to a mobile device of the user through at least one of a short message service (SMS) gateway, a mobile phone network, and the Internet.Type: GrantFiled: March 21, 2008Date of Patent: February 24, 2015Assignee: CellTrust CorporationInventors: Kevin K Moshir, Sean Moshir, Houman Shafiezadeh
-
Patent number: 8862129Abstract: A method of establishing a registration between a mobile device and a server includes receiving at the server an SMS or MMS from a mobile device. The server receives the phone number of the mobile device, verifies the phone number of the mobile device against a whitelist to authorize a registration between the mobile device and the server, and verifies a secure identification code that is input at the mobile device. The secure identification code is provided to a user of the mobile phone before the mobile device is registered with the server. The secure identification code can be provided to the user via an administrator of the server. An encryption key established between the mobile device and the server can be used to provide or enhance encryption of a voice communication, such as a VoIP communication, made using the mobile device.Type: GrantFiled: February 22, 2013Date of Patent: October 14, 2014Assignee: Celltrust CorporationInventors: Sean Moshir, Kevin Moshir, Ali A Khanban, Joshua Lindsay
-
Publication number: 20140214610Abstract: A method and system is provided for evaluating an application manufacturer's credibility to produce or maintain a mobile device application. The method includes gathering information about an application manufacturer, wherein the information includes at least one of: (i) publicly available information about the manufacture; (ii) private information provided by the manufacturer; and (iii) source code information for the application developed by the manufacturer. With the computer system, the gathered information is stored in a manufacturer profile, which includes a plurality of attributes of the manufacturer. The computer system uses the manufacturer profile to calculate a score for the manufacturer, which is then used to calculate an application risk score associated with applications produced or maintained by the manufacturer. The risk score reflects, at least in part, the credibility of the manufacturer to produce or maintain the mobile device application.Type: ApplicationFiled: January 31, 2014Publication date: July 31, 2014Inventors: Sean Moshir, Kevin K. Moshir, Ali A. Khanban, Shayan Mashatian
-
Publication number: 20130252585Abstract: A method of establishing a registration between a mobile device and a server includes receiving at the server an SMS or MMS from a mobile device. The server receives the phone number of the mobile device, verifies the phone number of the mobile device against a whitelist to authorize a registration between the mobile device and the server, and verifies a secure identification code that is input at the mobile device. The secure identification code is provided to a user of the mobile phone before the mobile device is registered with the server. The secure identification code can be provided to the user via an administrator of the server. An encryption key established between the mobile device and the server can be used to provide or enhance encryption of a voice communication, such as a VoIP communication, made using the mobile device.Type: ApplicationFiled: February 22, 2013Publication date: September 26, 2013Inventors: Sean Moshir, Kevin Moshir, Ali A. Khanban, Joshua Lindsay
-
Patent number: 8407687Abstract: Methods, systems, and configured storage media are provided for discovering software updates, discovering if a given computer can use the software update, and then updating the computers with the software as needed automatically across a network without storing the updates on an intermediate machine within the network. Furthermore, when a failure is detected, the rollout is stopped and the software can be automatically removed from those computers that already were updated. The software update can be stored originally at an address that is inaccessible through the network firewall by intermediately uploading the software update to an update computer which is not a part of the network but has access through the firewall, which is then used to distribute the update.Type: GrantFiled: October 8, 2010Date of Patent: March 26, 2013Assignee: Lumension Security, Inc.Inventors: Sean Moshir, Christopher A. H. Andrew, Jack Lee Hudler, Leon Li, Jonathan M. Gordon, Michael Bacon, Noah Williams, Jonathan Lane, James J. Horton, Dan Ferguson
-
Publication number: 20120270560Abstract: Methods for authenticating access and providing positional awareness using mobile phones. Embodiments for authenticating access include receiving identification indicia from a person seeking access, sending a message to a person having authority for access, and receiving either a second message indicating that the person has taken an affirmative action to indicate authorization, or a password that was provided in the first message. Access may be computer access or physical access, as examples. Methods of providing positional awareness include obtaining or storing location coordinates, monitoring the location of a mobile phone, and providing an alarm, for example, through a second mobile phone. In a number of embodiments, location coordinates are automatically obtained from Internet websites. In some embodiments, parents can monitor the location of their children to make sure they do not get too close to a reported residence of a registered sex offender, for instance.Type: ApplicationFiled: June 22, 2012Publication date: October 25, 2012Inventors: Kevin K. Moshir, Sean Moshir, Houman Shafiezadeh
-
Patent number: 8280359Abstract: Methods for authorizing actions using mobile phones. Embodiments include receiving from a person having authority to authorize the action, an identification of a phone number for obtaining authorization for the action, receiving from a person seeking the action a request for authorization of the action, sending an automated first message through a mobile phone network to the mobile phone, including a description of the action for which authorization is requested, and receiving, from the first mobile phone, a second message, which authorizes the action. Actions that are authorized, in different embodiments, include computer access, physical access, and financial transactions. In various embodiments, the phone number may be received through the mobile phone network through the Internet, through a local signal, or directly from the user.Type: GrantFiled: October 31, 2007Date of Patent: October 2, 2012Assignee: CellTrust CorporationInventors: Sean Moshir, Houman Shafiezadeh, Kevin K. Moshir
-
Patent number: 8260274Abstract: Information or items that otherwise might be carried in a person's wallet or purse may be managed and stored on a mobile phone. Embodiments include a software application loaded on a mobile phone and an Internet website through which certain information can be transmitted to the phone by the user, third parties, or both. A user may be alerted to certain information or changes in information that meet certain criteria. The website may provide secure storage for information, filter information, and send encrypted and compressed nuggets or fractions of information to the phone for storage based on topic. E-mails may be searched for information, information may be sent to different parties, and signals may be sent locally to exchange information. Personal information may include account information, credit information or credit related information, financial information, or travel information, for example.Type: GrantFiled: October 31, 2007Date of Patent: September 4, 2012Assignee: CellTrust CorporationInventors: Kevin K Moshir, Sean Moshir, Houman Shafiezadeh
-
Patent number: 8225380Abstract: Methods for authenticating access and proving positional awareness using mobile phones. Embodiments for authenticating access include receiving identification indicia from a person seeking access, sending a message to a person having authority for access, and receiving either a second message indicating that the person has taken an affirmative action to indicate authorization, or a password that was provided in the first message. Access may be computer access or physical access, as examples. Methods of providing positional awareness include obtaining or storing location coordinates, monitoring the location of a mobile phone, and providing an alarm, for example, through a second mobile phone. In a number of embodiments, location coordinates are automatically obtained from Internet websites. In some embodiments, parents can monitor the location of their children to make sure they do not get too close to a reported residence of a registered sex offender, for instance.Type: GrantFiled: October 31, 2007Date of Patent: July 17, 2012Assignee: CellTrust CorporationInventors: Kevin K Moshir, Sean Moshir, Houman Shafiezadeh
-
Publication number: 20110151903Abstract: Information or items that otherwise might be carried in a person's wallet or purse may be managed and stored on a mobile phone. Embodiments include a software application loaded on a mobile phone and an Internet website through which certain information can be transmitted to the phone by the user, third parties, or both. A user may be alerted to certain information or changes in information that meet certain criteria. The website may provide secure storage for information, filter information, and send encrypted and compressed nuggets or fractions of information to the phone for storage based on topic. E-mails may be searched for information, information may be sent to different parties, and signals may be sent locally to exchange information. Personal information may include account information or travel information, for example.Type: ApplicationFiled: February 17, 2011Publication date: June 23, 2011Inventors: Sean Moshir, Kevin K. Moshir, Houman Shafiezadeh
-
Patent number: 7920851Abstract: Information or items that otherwise might be carried in a person's wallet or purse may be managed and stored on a mobile phone. Embodiments include a software application loaded on a mobile phone and an Internet website through which certain information can be transmitted to the phone by the user, third parties, or both. A user may be alerted to certain information or changes in information that meet certain criteria. The website may provide secure storage for information, filter information, and send encrypted and compressed nuggets or fractions of information to the phone for storage based on topic. E-mails may be searched for information, information may be sent to different parties, and signals may be sent locally to exchange information. Personal information may include account information or travel information, for example.Type: GrantFiled: May 25, 2007Date of Patent: April 5, 2011Assignee: CellTrust CorporationInventors: Sean Moshir, Kevin K. Moshir, Houman Shafiezadeh
-
Publication number: 20110029966Abstract: Methods, systems, and configured storage media are provided for discovering software updates, discovering if a given computer can use the software update, and then updating the computers with the software as needed automatically across a network without storing the updates on an intermediate machine within the network. Furthermore, when a failure is detected, the rollout is stopped and the software can be automatically removed from those computers that already were updated. The software update can be stored originally at an address that is inaccessible through the network firewall by intermediately uploading the software update to an update computer which is not a part of the network but has access through the firewall, which is then used to distribute the update.Type: ApplicationFiled: October 8, 2010Publication date: February 3, 2011Applicant: Lumension Security, Inc.Inventors: Sean Moshir, Christopher A. H. Andrew, Jack Lee Hudler, Leon Li, Jonathan M. Gordon, Michael Bacon, Noah Williams, Jonathan Lane, James J. Horton, Dan Ferguson
-
Patent number: 7823147Abstract: Methods, systems, and configured storage media are provided for discovering software updates, discovering if a given computer can use the software update, and then updating the computers with the software as needed automatically across a network without storing the updates on an intermediate machine within the network. Furthermore, when a failure is detected, the rollout is stopped and the software can be automatically removed from those computers that already were updated. The software update can be stored originally at an address that is inaccessible through the network firewall by intermediately uploading the software update to an update computer which is not a part of the network but has access through the firewall, which is then used to distribute the update.Type: GrantFiled: June 23, 2005Date of Patent: October 26, 2010Assignee: Lumension Security, Inc.Inventors: Sean Moshir, Christopher A. H. Andrew, Jack Lee Hudler, Leon Li, Jonathan M. Gordon, Michael Bacon, Noah Williams, Jonathan Lane, James J. Horton, Dan Ferguson
-
Publication number: 20080214111Abstract: A system and method having an alarm software module recorded on a computer-readable medium programmed to monitor a connection between an accoutrement and a mobile phone. The alarm software module instructs an alarm to be issued if a threshold is met. In addition, the module may instruct the phone to lock.Type: ApplicationFiled: February 27, 2008Publication date: September 4, 2008Inventors: Sean MOSHIR, Kevin K. MOSHIR, Houman SHAFIEZADEH
-
Publication number: 20080167060Abstract: A system and method having a first software module of a server recorded on a computer-readable medium programmed to receive a request for information from a user. The user requests a purchase of a lottery ticket, information on lottery laws and regulations, and lottery winnings distribution information using at least one of a short code and a long code and a generic assigned identification. The system obtains a lottery ticket number, lottery laws and regulations, and lottery winnings distribution information requested by the user. The system send the lottery ticket number, lottery laws and regulations, and lottery winnings distribution information requested by the user to a mobile device of the user through at least one of a short message service (SMS) gateway, a mobile phone network, and the Internet.Type: ApplicationFiled: March 21, 2008Publication date: July 10, 2008Inventors: Sean Moshir, Kevin K. Moshir, Houman Shafiezadeh
-
Publication number: 20080133930Abstract: Methods for authenticating access and proving positional awareness using mobile phones. Embodiments for authenticating access include receiving identification indicia from a person seeking access, sending a message to a person having authority for access, and receiving either a second message indicating that the person has taken an affirmative action to indicate authorization, or a password that was provided in the first message. Access may be computer access or physical access, as examples. Methods of providing positional awareness include obtaining or storing location coordinates, monitoring the location of a mobile phone, and providing an alarm, for example, through a second mobile phone. In a number of embodiments, location coordinates are automatically obtained from Internet websites. In some embodiments, parents can monitor the location of their children to make sure they do not get too close to a reported residence of a registered sex offender, for instance.Type: ApplicationFiled: October 31, 2007Publication date: June 5, 2008Inventors: Kevin K. Moshir, Sean Moshir, Houman Shafiezadeh
-
Publication number: 20080109370Abstract: Information or items that otherwise might be carried in a person's wallet or purse may be managed and stored on a mobile phone. Embodiments include a software application loaded on a mobile phone and an Internet website through which certain information can be transmitted to the phone by the user, third parties, or both. A user may be alerted to certain information or changes in information that meet certain criteria. The website may provide secure storage for information, filter information, and send encrypted and compressed nuggets or fractions of information to the phone for storage based on topic. E-mails may be searched for information, information may be sent to different parties, and signals may be sent locally to exchange information. Personal information may include account information, credit information or credit related information, financial information, or travel information, for example.Type: ApplicationFiled: October 31, 2007Publication date: May 8, 2008Inventors: Kevin Moshir, Sean Moshir, Houman Shafiezadeh
-
Publication number: 20080108324Abstract: Methods for authorizing actions using mobile phones. Embodiments include receiving from a person having authorize the action, an identification of a phone number for obtaining authorization for the action, receiving from a person seeking the action a request for authorization of the action, sending an automated first message through a mobile phone network to the mobile phone, including a description of the action for which authorization is requested, and receiving, from the first mobile phone, a second message, which authorizes the action. Actions that are authorized, in different embodiments, include computer access, physical access, and financial transactions. In various embodiments, the phone number may be received through the mobile phone network through the Internet, through a local signal, or directly from the user.Type: ApplicationFiled: October 31, 2007Publication date: May 8, 2008Inventors: Sean Moshir, Houman Shafiezadeh, Kevin Moshir
-
Publication number: 20080081601Abstract: A system and method having a first software module of a server recoreded on a computer-readable medium programmed to receive a request for information from a user. The user sends a text message to a short code, where the information depends on a generic assigned identification associated with real estate information, automobile information, and/or personal property information. The server communicated with a third party server to obtain the real estate information, automobile information, and/or personal property information requested by the user. The server sends the real estate information, automobile information, and/or personal property information to a mobile phone of the user through a mobile phone network.Type: ApplicationFiled: September 28, 2007Publication date: April 3, 2008Inventors: Sean Moshir, Kevin K. Moshir, Houman Shafiezadeh
-
Publication number: 20070293202Abstract: Information or items that otherwise might be carried in a person's wallet or purse may be managed and stored on a mobile phone. Embodiments include a software application loaded on a mobile phone and an Internet website through which certain information can be transmitted to the phone by the user, third parties, or both. A user may be alerted to certain information or changes in information that meet certain criteria. The website may provide secure storage for information, filter information, and send encrypted and compressed nuggets or fractions of information to the phone for storage based on topic. E-mails may be searched for information, information may be sent to different parties, and signals may be sent locally to exchange information. Personal information may include account information or travel information, for example.Type: ApplicationFiled: May 25, 2007Publication date: December 20, 2007Inventors: Sean Moshir, Kevin Moshir, Houman Shafiezadeh