Patents by Inventor Shmuel Shaffer

Shmuel Shaffer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11477755
    Abstract: Embodiments provide for guided alignment of the orientation of two wireless devices. A first wireless device is at a known position and a known orientation. A signal from a second wireless device is received via a plurality of receive elements of the first wireless device. The first wireless device measures phase differences of the signal at the plurality of receive elements, and determines locations of each of the second wireless device's transmit elements based on the differences. Based on the transmit element locations, and a known antenna layout of the second wireless device, an orientation of the second wireless device is determined. Based on differences between the determined orientation and the known orientation of the first wireless device, instructions for aligning the devices are generated. Once the devices are aligned, location estimates of a third wireless device are made by both the first wireless device and the second wireless device.
    Type: Grant
    Filed: June 29, 2020
    Date of Patent: October 18, 2022
    Assignee: Juniper Networks, Inc.
    Inventors: Neal Dante Castagnoli, Shmuel Shaffer
  • Patent number: 11444928
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Grant
    Filed: December 4, 2019
    Date of Patent: September 13, 2022
    Assignee: Journey.ai
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20220278969
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: May 20, 2022
    Publication date: September 1, 2022
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20220231996
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: April 1, 2022
    Publication date: July 21, 2022
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Patent number: 11363005
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Grant
    Filed: December 4, 2019
    Date of Patent: June 14, 2022
    Assignee: Journey.ai
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Patent number: 11349559
    Abstract: According to one or more of the embodiments herein, systems and techniques are provided for accurately determining a round trip time (RTT) to a satellite. In particular, a method according to one embodiment herein may comprise: receiving, at a device, a reference signal with a stable phase; measuring, by the device, a phase delta over time between the reference signal and an internal signal of an internal oscillator of the device; transmitting, by the device at a transmission time, a ranging signal toward a particular satellite; receiving, by the device at a reception time, a return of the ranging signal from the particular satellite; and determining, by the device, a round trip time (RTT) of the ranging signal that accounts for a phase drift of the internal oscillator between the transmission time and the reception time according to the measured phase delta over time.
    Type: Grant
    Filed: July 22, 2021
    Date of Patent: May 31, 2022
    Assignee: Higher Ground LLC
    Inventors: David Alexander Reuss, Darren Robert Reis, Shmuel Shaffer
  • Patent number: 11346957
    Abstract: The present disclosure relates generally to satellite communication systems, and, more particularly, to trilateration-based satellite location accuracy for improved satellite-based geolocation are provided.
    Type: Grant
    Filed: February 26, 2021
    Date of Patent: May 31, 2022
    Assignee: Higher Ground LLC
    Inventors: Robert S. Reis, Shmuel Shaffer, Darren Robert Reis, James M. Behmke, David Alexander Reuss
  • Patent number: 11323424
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Grant
    Filed: December 4, 2019
    Date of Patent: May 3, 2022
    Assignee: Journey.ai
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20220116235
    Abstract: Embodiments are generally directed to managing power consumption of powered devices. In some embodiments, the powered devices draw power from a common source of power, which is limited. Under certain circumstances, exceeding the power limits can cause interruption of power to one or more of the devices, thus introducing a source of communication failures. To ensure reliable communications, an attempt to increase a power consumption of a first powered device in a power group is first reviewed to determine if the increase will cause a supplied power of the group to exceed a maximum power of the group. If the increase will cause the maximum power to be exceeded, the increase is modified, in some circumstances, to fit within the maximum power level. Alternatively, power consumption of a lower priority device is reduced to accommodate the requested power consumption increase.
    Type: Application
    Filed: October 14, 2020
    Publication date: April 14, 2022
    Inventors: Oscar Ernohazy, Joshua Rosenthal, Jason Harris, John James Musante, Shmuel Shaffer
  • Patent number: 11289077
    Abstract: A contact center system can receive audio messages. The system can review audio messages by identifying phoneme strings within the audio messages associated with a characteristic. A phoneme can be a component of spoken language. Identified phoneme strings are used to analyze subsequent audio messages to determine the presence of the characteristic without requiring human analysis. Thus, the identification of phoneme strings then can be used to determine a characteristic of audio messages without transcribing the messages.
    Type: Grant
    Filed: July 15, 2014
    Date of Patent: March 29, 2022
    Assignee: Avaya Inc.
    Inventors: Valentine C. Matula, Shmuel Shaffer
  • Publication number: 20220006649
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: May 28, 2021
    Publication date: January 6, 2022
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20210399901
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: September 1, 2021
    Publication date: December 23, 2021
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20210385092
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: August 25, 2021
    Publication date: December 9, 2021
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20210320805
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: May 28, 2021
    Publication date: October 14, 2021
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20210311198
    Abstract: According to one or more embodiments herein, interferometry-based satellite location accuracy is provided.
    Type: Application
    Filed: February 26, 2021
    Publication date: October 7, 2021
    Inventors: Robert S. Reis, Shmuel Shaffer, Darren Robert Reis, James M. Behmke
  • Publication number: 20210311161
    Abstract: The present disclosure relates generally to satellite communication systems, and, more particularly, to trilateration-based satellite location accuracy for improved satellite-based geolocation are provided.
    Type: Application
    Filed: February 26, 2021
    Publication date: October 7, 2021
    Inventors: Robert S. Reis, Shmuel Shaffer, Darren Robert Reis, James M. Behmke
  • Publication number: 20210311199
    Abstract: Satellite echoing for geolocation and mitigation of Global Navigation Satellite System (GNSS) denial are provided herein, where an example method comprises: transmitting an initiated message to a communication satellite along a communication path that has a target device with an unknown distance to the communication satellite; receiving a returned message from the communication satellite over the communication path in response to the initiated message; determining a local time difference between the transmission time and the reception time; calculating a distance between the communication satellite and the target device, the distance calculated based on a portion of the determined time difference associated with only a single traversal of a portion of the communication path that is between the communication satellite and the target device; and performing one or more actions based on the distance between the communication satellite and the target device.
    Type: Application
    Filed: February 26, 2021
    Publication date: October 7, 2021
    Inventors: Robert S. Reis, Shmuel Shaffer, Darren Robert Reis, James M. Behmke
  • Publication number: 20210311201
    Abstract: According to one or more of the embodiments herein, systems and techniques for multi-system-based detection and mitigation of Global Navigation Satellite System (GNSS) spoofing are provided. In one embodiment, a method comprises: obtaining a first location of an object from a primary location determination hardware system; obtaining a second location of the object from a secondary location determination hardware system; determining a distance difference between the first location and the second location; determining whether the distance difference between the first location and the second location is acceptable based on a threshold distance; and initiating one or more mitigation actions in response to the distance difference between the first location and the second location being unacceptable.
    Type: Application
    Filed: February 26, 2021
    Publication date: October 7, 2021
    Inventors: Robert S. Reis, Shmuel Shaffer, Darren Robert Reis, James M. Behmke
  • Publication number: 20210311203
    Abstract: According to one or more of the embodiments herein, systems and techniques for satellite relaying for geolocation and mitigation of Global Navigation Satellite System (GNSS) denial are provided.
    Type: Application
    Filed: February 26, 2021
    Publication date: October 7, 2021
    Inventors: Robert S. Reis, Shmuel Shaffer, Darren Robert Reis, James M. Behmke
  • Publication number: 20210313678
    Abstract: In one embodiment, a method comprises: receiving a signal from a remote antenna at first and second antennas, the first and second antenna being collocated and offset from one another by a fixed predetermined angle such that a center of a high gain region of a main lobe of the first antenna is substantially aligned with a low gain region of a main lobe of the second antenna; determining a set of characteristics of the signal based on the signal being received at the first antenna; decoding a first data set based on the signal being received at the first antenna and a second data set based on the signal being received at the second antenna, both using the set of signal characteristics; and determining a currently aimed direction of the first antenna with relation to the remote antenna based on the difference between the first and second data sets.
    Type: Application
    Filed: March 30, 2021
    Publication date: October 7, 2021
    Inventors: Shmuel Shaffer, Darren Robert Reis, James M. Behmke