Patents by Inventor Shane Alexander Farmer

Shane Alexander Farmer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11765139
    Abstract: Methods and apparatus for encrypting and decrypting data for wearable devices that are not based on authentication techniques, such as login/password or handshaking, are provided. A computing device receives a message. The message includes encrypted data and a cryptographic reference. The encrypted data includes physiological data of a wearer of the wearable device. The cryptographic reference includes a reference to a first cryptographic technique. The computing device determines the first cryptographic technique based on the reference to the first cryptographic technique. The computing device determines a cryptographic key. The computing device decrypts the encrypted data using the first cryptographic technique and the cryptographic key to obtain decrypted data. The computing device stores the decrypted data.
    Type: Grant
    Filed: June 16, 2020
    Date of Patent: September 19, 2023
    Assignee: VERILY LIFE SCIENCES LLC
    Inventors: Sarel Kobus Jooste, Jonathan Dixon, Shane Alexander Farmer, Patrick Lin Wheeler
  • Patent number: 11223951
    Abstract: Methods and devices for communicating sensitive data to applications are provided. A wearable device can wirelessly connect with a second computing device. The wearable device can be configured to obtain sensitive data. The second computing device can provide a first software application and a second software application. The wearable device can wirelessly receive a first request for the sensitive data from the first application. The wearable device can send a response denying the first request to the first application. The wearable device can wirelessly receive a second request for the sensitive data from the second application. The wearable device can determine whether the second request is authenticated to be associated with the second application. After determining that the second request is authenticated to be associated with the second application, the wearable device can wirelessly send the sensitive data to the second application.
    Type: Grant
    Filed: February 8, 2017
    Date of Patent: January 11, 2022
    Assignee: VERILY LIFE SCIENCES LLC
    Inventors: Shane Alexander Farmer, Robert Lieh-Yuan Tsai
  • Patent number: 10728224
    Abstract: Methods and apparatus for encrypting and decrypting data for wearable devices that are not based on authentication techniques, such as login/password or handshaking, are provided. A computing device receives a message. The message includes encrypted data and a cryptographic reference. The encrypted data includes physiological data of a wearer of the wearable device. The cryptographic reference includes a reference to a first cryptographic technique. The computing device determines the first cryptographic technique based on the reference to the first cryptographic technique. The computing device determines a cryptographic key. The computing device decrypts the encrypted data using the first cryptographic technique and the cryptographic key to obtain decrypted data. The computing device stores the decrypted data.
    Type: Grant
    Filed: January 8, 2018
    Date of Patent: July 28, 2020
    Assignee: VERILY LIFE SCIENCES LLC
    Inventors: Sarel Kobus Jooste, Jonathan Dixon, Shane Alexander Farmer, Patrick Lin Wheeler
  • Patent number: 9900287
    Abstract: Methods and apparatus for encrypting and decrypting data for wearable devices that are not based on authentication techniques, such as login/password or handshaking, are provided. A computing device receives a message. The message includes encrypted data and a cryptographic reference. The encrypted data includes physiological data of a wearer of the wearable device. The cryptographic reference includes a reference to a first cryptographic technique. The computing device determines the first cryptographic technique based on the reference to the first cryptographic technique. The computing device determines a cryptographic key. The computing device decrypts the encrypted data using the first cryptographic technique and the cryptographic key to obtain decrypted data. The computing device stores the decrypted data.
    Type: Grant
    Filed: September 12, 2014
    Date of Patent: February 20, 2018
    Assignee: Verily Life Sciences, LLC
    Inventors: Sarel Kobus Jooste, Jonathan Dixon, Shane Alexander Farmer, Patrick Lin Wheeler
  • Patent number: 9600676
    Abstract: Methods and devices for communicating sensitive data to applications are provided. A wearable device can wirelessly connect with a second computing device. The wearable device can be configured to obtain sensitive data. The second computing device can provide a first software application and a second software application. The wearable device can wirelessly receive a first request for the sensitive data from the first application. The wearable device can send a response denying the first request to the first application. The wearable device can wirelessly receive a second request for the sensitive data from the second application. The wearable device can determine whether the second request is authenticated to be associated with the second application. After determining that the second request is authenticated to be associated with the second application, the wearable device can wirelessly send the sensitive data to the second application.
    Type: Grant
    Filed: June 16, 2014
    Date of Patent: March 21, 2017
    Assignee: Verily Life Sciences LLC
    Inventors: Shane Alexander Farmer, Robert Lieh-Yuan Tsai
  • Publication number: 20160136482
    Abstract: Several methods, devices and systems that provide features for improved activity sport sessions are described. In one embodiment, a multifunctional device includes an inertial measurement unit to sense movements of an activity device (e.g., a board, a surfboard, a windsurfing board, etc.) during an activity sport session and to sense at least one input for indicating a target location during the activity sport session. The device also includes at least one processing unit coupled to the inertial measurement unit. The at least one processing unit is configured to designate a target location in response to the inertial measurement unit sensing an input for indicating the target location, to record the target location, to determine a current location of the activity device, and to compare the current location and the target location. In one example, the at least one processing unit is further configured to generate a directional output if the target location and current location are different.
    Type: Application
    Filed: November 19, 2015
    Publication date: May 19, 2016
    Inventors: Mark West Askew, Jr., Shane Alexander Farmer, Joseph John Hebenstreit, Zachary Barringer Scott
  • Patent number: 8706081
    Abstract: A method and system for packet inspection in a near field communication (NFC) controller for secure element (SE) protection are described. In a communication device, the NFC controller can receive filtering rules that correspond to security for an applet in the SE. The NFC controller can also receive a packet with commands or instructions for the SE. The NFC controller can inspect the contents of the packet based on the filtering rules and determine whether to communicate the packet to the SE. The packet filtering performed by the NFC controller can also be based on whether the packet was received through an interface with an operating system in the communication device or through an interface with an NFC antenna. The filtering rules can be removed or disabled when an update for the applet is received and installed in the SE.
    Type: Grant
    Filed: December 18, 2012
    Date of Patent: April 22, 2014
    Assignee: Google Inc.
    Inventors: Ismail Cem Paya, Shane Alexander Farmer, Robert Tsai
  • Patent number: 8625800
    Abstract: Transferring control of a secure element between TSMs comprises a zone master key established between the TSMs that facilitates encryption of a temporary key. The TSMs create the zone master key prior to initiation of transfer of control. Once transfer of control is initiated, the first TSM establishes a communication channel and deletes its key from the secure element. The first TSM creates a temporary key that is encrypted with the zone master key established between the first TSM and the second TSM. The encrypted temporary key is communicated to the second TSM with a device identifier. The second TSM decrypts the temporary key using the zone master key and identifies the user device using the device identifier. The new TSM establishes a communication channel and deletes the temporary key from the secure element. The new TSM then inputs and saves its key into the secure element.
    Type: Grant
    Filed: February 25, 2013
    Date of Patent: January 7, 2014
    Assignee: Google Inc.
    Inventors: Sarel Kobus Jooste, John Joseph, Shane Alexander Farmer
  • Publication number: 20130223623
    Abstract: Transferring control of a secure element between TSMs comprises a zone master key established between the TSMs that facilitates encryption of a temporary key. The TSMs create the zone master key prior to initiation of transfer of control. Once transfer of control is initiated, the first TSM establishes a communication channel and deletes its key from the secure element. The first TSM creates a temporary key that is encrypted with the zone master key established between the first TSM and the second TSM. The encrypted temporary key is communicated to the second TSM with a device identifier. The second TSM decrypts the temporary key using the zone master key and identifies the user device using the device identifier. The new TSM establishes a communication channel and deletes the temporary key from the secure element. The new TSM then inputs and saves its key into the secure element.
    Type: Application
    Filed: February 25, 2013
    Publication date: August 29, 2013
    Inventors: Sarel Kobus Jooste, John Joseph, Shane Alexander Farmer
  • Patent number: 8385553
    Abstract: Transferring control of a secure element between TSMs comprises a zone master key established between the TSMs that facilitates encryption of a temporary key. The TSMs create the zone master key prior to initiation of transfer of control. Once transfer of control is initiated, the first TSM establishes a communication channel and deletes its key from the secure element. The first TSM creates a temporary key that is encrypted with the zone master key established between the first TSM and the second TSM. The encrypted temporary key is communicated to the second TSM with a device identifier. The second TSM decrypts the temporary key using the zone master key and identifies the user device using the device identifier. The new TSM establishes a communication channel and deletes the temporary key from the secure element. The new TSM then inputs and saves its key into the secure element.
    Type: Grant
    Filed: June 14, 2012
    Date of Patent: February 26, 2013
    Assignee: Google Inc.
    Inventors: Sarel Kobus Jooste, John Joseph, Shane Alexander Farmer