Patents by Inventor Shmuel Shaffer

Shmuel Shaffer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200259845
    Abstract: The techniques herein are directed generally to providing access control and identity verification for communications when receiving a communication from an entity to be verified. In one particular embodiment, an illustrative method according to one or more embodiments of the present disclosure may comprise: receiving, at a receiving device, a communication from an initiating device on a communication channel; determining, by the receiving device over a verification channel with a verification service, whether an identity associated with the initiating device is verified by the verification service; managing, by the receiving device in response to the identity associated with the initiating device being verified, the communication from the initiating device according to the identity being verified; and managing, by the receiving device in response to the identity associated with the initiating device being unverified, the communication from the initiating device according to the identity being unverified.
    Type: Application
    Filed: April 29, 2020
    Publication date: August 13, 2020
    Inventors: Shmuel Shaffer, Yolanda Schwartz, Alexander John Shockley
  • Publication number: 20200259828
    Abstract: The techniques herein are directed generally to providing access control and identity verification for communications when initiating a communication to an entity to be verified. In one particular embodiment, an illustrative method according to one or more embodiments of the present disclosure may comprise: initiating, from an initiating device, a communication to a receiving device on a communication channel; determining, by the initiating device over a verification channel with a verification service, whether an identity associated with the receiving device is verified by the verification service; managing, by the initiating device in response to the identity associated with the receiving device being verified, the communication to the receiving device according to the identity being verified; and managing, by the initiating device in response to the identity associated with the receiving device being unverified, the communication to the receiving device according to the identity being unverified.
    Type: Application
    Filed: April 29, 2020
    Publication date: August 13, 2020
    Inventors: Shmuel Shaffer, Yolanda Schwartz, Alexander John Shockley
  • Patent number: 10742309
    Abstract: Fifty seven percent of the world's population, some 4.2 billion people, reside in places without internet access. Consequently, these areas also have no or limited infrastructure to deploy Internet of Things (IoT) devices/sensors. Numerous companies are racing to fill this communication gap and provide internet not only to those without internet but to also improve and provide additional options to those with internet access. One exemplary aspect is capable of providing a technically unique lower-cost solution for internet connectivity, and in particular for applications requiring real-time and/or near-real-time connectivity.
    Type: Grant
    Filed: June 14, 2017
    Date of Patent: August 11, 2020
    Assignee: HIGHER GROUND LLC
    Inventors: Robert Reis, Darren Reis, Shmuel Shaffer
  • Publication number: 20200228333
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: December 4, 2019
    Publication date: July 16, 2020
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20200228506
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: December 4, 2019
    Publication date: July 16, 2020
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20200226592
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: December 4, 2019
    Publication date: July 16, 2020
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Patent number: 10713668
    Abstract: A method and a system for adaptive outbound campaign are provided. The system includes a monitoring module for real-time monitoring of public sentiment to an outbound campaign. Further, the system includes an adaptive module communicably coupled to the monitoring module. The adaptive module further adapts one or more parameters corresponding to the outbound campaign based on the monitored public sentiment.
    Type: Grant
    Filed: June 20, 2013
    Date of Patent: July 14, 2020
    Assignee: Avaya Inc.
    Inventors: Shmuel Shaffer, Reinhard P. Klemm
  • Patent number: 10715206
    Abstract: A communications protocol in accordance with one exemplary embodiment uses information from GPS satellites to synchronize the phases of transmitters, and aligns the phase with a spreading code used to de-spread the received signals at, for example, a ground station.
    Type: Grant
    Filed: January 22, 2019
    Date of Patent: July 14, 2020
    Assignee: HIGHER GROUND LLC
    Inventors: Shmuel Shaffer, Bruce Leonard McKinley, Scott A. McDermott
  • Publication number: 20200186506
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: December 4, 2019
    Publication date: June 11, 2020
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20200184084
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: December 4, 2019
    Publication date: June 11, 2020
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20200186344
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: December 4, 2019
    Publication date: June 11, 2020
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Publication number: 20200186363
    Abstract: The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.
    Type: Application
    Filed: December 4, 2019
    Publication date: June 11, 2020
    Inventors: Brett Shockley, Alexander John Shockley, Michael Joseph Frendo, Shmuel Shaffer, Kenneth Keiter, James M. Behmke
  • Patent number: 10574666
    Abstract: A system in accordance with one aspect mitigates interference with PtPRs (Point to Point Receivers) that may be caused by a Wi-Fi base station or terminal devices associated with the Wi-Fi base station.
    Type: Grant
    Filed: October 2, 2017
    Date of Patent: February 25, 2020
    Assignee: HIGHER GROUND LLC
    Inventors: Robert Reis, Shmuel Shaffer
  • Patent number: 10523684
    Abstract: In one embodiment, a ground station server of a satellite communication system mitigates congestion on a particular forward communication path via an intermediate satellite from the ground station server to a plurality of distributed modules. In particular, in response to determining that the level of congestion is above a threshold, then the ground station server mitigates the congestion by, e.g.
    Type: Grant
    Filed: October 2, 2017
    Date of Patent: December 31, 2019
    Assignee: Higher Ground LLC
    Inventors: Timothy Reed Cooper, Bruce Leonard McKinley, Scott A. McDermott, Mark Evan Russell, David Daugherty, Shmuel Shaffer
  • Publication number: 20190341999
    Abstract: In one embodiment, a communicating device (e.g., either a ground station server or a particular distributed module of a satellite communication system) mitigates congestion on a particular return communication path via an intermediate satellite from the plurality of distributed modules to the ground station server. In particular, in response to determining that the level of congestion is above a threshold, then the communication device mitigates the congestion by, e.g.
    Type: Application
    Filed: July 17, 2019
    Publication date: November 7, 2019
    Inventors: Timothy Reed Cooper, Bruce Leonard McKinley, Scott A. McDermott, Mark Evan Russell, David Daugherty, Shmuel Shaffer
  • Patent number: 10404358
    Abstract: In one embodiment, a communicating device (e.g., either a ground station server or a particular distributed module of a satellite communication system) mitigates congestion on a particular return communication path via an intermediate satellite from the plurality of distributed modules to the ground station server. In particular, in response to determining that the level of congestion is above a threshold, then the communication device mitigates the congestion by, e.g.
    Type: Grant
    Filed: October 2, 2017
    Date of Patent: September 3, 2019
    Assignee: Higher Ground LLC
    Inventors: Timothy Reed Cooper, Bruce Leonard McKinley, Scott A. McDermott, Mark Evan Russell, David Daugherty, Shmuel Shaffer
  • Patent number: 10349422
    Abstract: In one embodiment, a server of a first wireless communication network receives a wireless communication originated by a terminal of the first wireless communication network, the wireless communication containing a current geographic location of the terminal as determined by the terminal. The server may then determine acceptable communication parameters for the terminal to communicate on the first wireless communication network, e.g., based on preventing transmission by the terminal that might interfere with operation of one or more unintended receivers. The server then generates an instruction message for the terminal based on the acceptable communication parameters, and transmits the instruction message toward the terminal to cause the terminal to only continue transmitting according to acceptable communication parameters.
    Type: Grant
    Filed: March 10, 2017
    Date of Patent: July 9, 2019
    Assignee: Higher Ground LLC
    Inventors: Robert S. Reis, Mark E. Russell, Shmuel Shaffer
  • Publication number: 20190208062
    Abstract: System and method to calculate expected waiting time of a caller to a calling center, the method including: monitoring, by a monitor circuit, a content of a present communication session; estimating a point of progress of the monitored communication session; comparing the point of progress to a historical statistic; calculating, by a processor, a projection of a duration of a remainder of the present communication session; and providing, by a communication circuit, an expected waiting time (EWT) based upon the projection of the duration of the remainder of the present communication session. Embodiments may include a speech search process to record call progress. The speech search process may inform, diagnose or monitor a call. The speech search process may inform a supervisor of progress, to take action if necessary. The speech search process may dynamically trigger other processes and construct profiles based upon historical data.
    Type: Application
    Filed: March 13, 2019
    Publication date: July 4, 2019
    Inventors: Shmuel Shaffer, Seamus Hayes, Paul D'Arcy
  • Publication number: 20190199859
    Abstract: A system for providing customized customer service interaction between a user and an enterprise is disclosed. The system includes a badge and a badge reader. The badge is installed at a user device, and the badge reader is installed at the enterprise. The badge is configured to generate an access key for a customer's social network account based on a customer's work request to the enterprise. The badge reader is configured to retrieve user data as permitted by the associated access key from the badge, and route a work request of the user to a suitable agent of the enterprise based on the user data.
    Type: Application
    Filed: December 18, 2018
    Publication date: June 27, 2019
    Inventors: Reinhard P. Klemm, Shmuel Shaffer
  • Patent number: 10330796
    Abstract: In one embodiment, a process obtains a first compensated directional reading from a first directional sensor of a directionally sensitive system, and obtains a second compensated directional reading from a second directional sensor of the directionally sensitive system. The process may then determine, a difference between the first compensated directional reading and the second compensated directional reading, and declares, in response to the difference being greater than an acceptable threshold, an inaccurate directional reading. As such, the process may then prevent performance of a directionally sensitive action by the directionally sensitive system in response to an inaccurate directional reading.
    Type: Grant
    Filed: May 19, 2017
    Date of Patent: June 25, 2019
    Assignee: Higher Ground LLC
    Inventors: Robert S. Reis, Michael Glenn Capella, Shmuel Shaffer