Patents by Inventor Simon Booth
Simon Booth has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250110058Abstract: A viewing device is configured to magnify and view a marking on a gemstone. The viewing device includes a light source, a mask, a magnifying optical device, and a camera. The light source generates light directed along a first path towards the gemstone. The mask partially obscures the light from the light source to generate a pattern. The partially obscured light is reflected off of the gemstone and magnified by the magnifying optical device. The camera is positioned to capture the magnified light. One or more additional light sources generate light directed along a second path towards the gemstone. The light enters the gemstone through a preferred facet and internally reflects. Internally reflected light scatters off of an internal mark in the gemstone and exits the gemstone through the gemstone's top face. The reflected and scattered light is magnified by the magnifying optical device and captured by the camera.Type: ApplicationFiled: July 8, 2024Publication date: April 3, 2025Applicant: OPSYDIA LIMITEDInventors: Simon HENLEY, Lewis FISH, Ajay VARGHESE, Joseph DIXON, Matthew ASHDALE, Patrick SALTER, Martin BOOTH
-
Patent number: 12074855Abstract: One disclosed example involves a client device joining a videoconferencing meeting in which there is end-to-end encryption, where the end-to-end encryption is implemented by the client devices participating in the meting using a meeting key provided by the meeting host. Thereafter, the client device receives a public key of an asymmetric key pair corresponding to the host of the meeting, where the public key is different from the meeting key. The client device then generates a security code based on the public key and output the security code on a display device. The security code can be compared to another security code generated by another client device participating in the meeting to verify if the meeting is secure. The client device may also receive encrypted videoconferencing data, decrypt it using the meeting key, and output the decrypted videoconferencing data on the display device.Type: GrantFiled: August 11, 2023Date of Patent: August 27, 2024Assignee: Zoom Video Communications, Inc.Inventors: Karan Lyons, Simon Booth
-
Publication number: 20240089096Abstract: One disclosed example method includes a leader client device associated with a leader participant generating a meeting key for a video meeting joined by multiple participants. For each participant, the leader client device obtains a long-term public key and a cryptographic signature associated with the participant. The leader client device verifies the cryptographic signature of the participant based on the long-term public key and the cryptographic signature. If the verification is successful, the leader client device encrypts the meeting key for the participant using a short-term private key generated by the leader client device, a short-term public key of the participant, a meeting identifier, and a user identifier identifying the participant. The leader client device further publishes the encrypted meeting key for the participant on the meeting system. The leader client device encrypts and decrypts meeting data communicated with other participants based on the meeting key.Type: ApplicationFiled: November 16, 2023Publication date: March 14, 2024Applicant: Zoom Video Communications, Inc.Inventors: Simon Booth, Karan Lyons
-
Publication number: 20240031345Abstract: One disclosed example involves a client device joining a videoconferencing meeting in which there is end-to-end encryption, where the end-to-end encryption is implemented by the client devices participating in the meting using a meeting key provided by the meeting host. Thereafter, the client device receives a public key of an asymmetric key pair corresponding to the host of the meeting, where the public key is different from the meeting key. The client device then generates a security code based on the public key and output the security code on a display device. The security code can be compared to another security code generated by another client device participating in the meeting to verify if the meeting is secure. The client device may also receive encrypted videoconferencing data, decrypt it using the meeting key, and output the decrypted videoconferencing data on the display device.Type: ApplicationFiled: August 11, 2023Publication date: January 25, 2024Applicant: Zoom Video Communications, Inc.Inventors: Karan Lyons, Simon Booth
-
Patent number: 11882215Abstract: One disclosed example method includes a leader client device associated with a leader participant generating a meeting key for a video meeting joined by multiple participants. For each participant, the leader client device obtains a long-term public key and a cryptographic signature associated with the participant. The leader client device verifies the cryptographic signature of the participant based on the long-term public key and the cryptographic signature. If the verification is successful, the leader client device encrypts the meeting key for the participant using a short-term private key generated by the leader client device, a short-term public key of the participant, a meeting identifier, and a user identifier identifying the participant. The leader client device further publishes the encrypted meeting key for the participant on the meeting system. The leader client device encrypts and decrypts meeting data communicated with other participants based on the meeting key.Type: GrantFiled: May 21, 2021Date of Patent: January 23, 2024Assignee: Zoom Video Communications, Inc.Inventors: Simon Booth, Karan Lyons
-
Patent number: 11765143Abstract: One disclosed example involves a client device joining a videoconferencing meeting in which there is end-to-end encryption, where the end-to-end encryption is implemented by the client devices participating in the meting using a meeting key provided by the meeting host. Thereafter, the client device receives a public key of an asymmetric key pair corresponding to the host of the meeting, where the public key is different from the meeting key. The client device then generates a security code based on the public key and output the security code on a display device. The security code can be compared to another security code generated by another client device participating in the meeting to verify if the meeting is secure. The client device may also receive encrypted videoconferencing data, decrypt it using the meeting key, and output the decrypted videoconferencing data on the display device.Type: GrantFiled: May 21, 2021Date of Patent: September 19, 2023Assignee: Zoom Video Communications, Inc.Inventors: Karan Lyons, Simon Booth
-
Publication number: 20230289527Abstract: Disclosed are systems, apparatuses, processes, and computer-readable media to converging state between generated and revised documents. A method includes executing a first instance of a user interface for creating a plurality of paragraphs from a set of claims; in response to the execution of the first instance of the user interface, creating the plurality of paragraphs based on input into the user interface; inserting the plurality of paragraphs into a document associated with the document processing application; after a claim in the set of claims is edited in the document, executing a second instance of the user interface; and in response to the execution of the second instance of the user interface, revising the plurality of paragraphs based on input into the user interface during the second instance. The paragraphs can be revised based on disclosed mechanisms to embed metadata within the XML content.Type: ApplicationFiled: March 8, 2022Publication date: September 14, 2023Inventor: Simon Booth
-
Publication number: 20230222286Abstract: An NLP analysis method based on identification of common terms is disclosed. The improved NLP analysis can separate different parts of a patent claim into discrete claim segments based on the common terms. A user interface that corresponds to a flowchart allows the user to drag and drop the claim segments to form complex relationships, which is used to generate a patent specification.Type: ApplicationFiled: March 8, 2023Publication date: July 13, 2023Inventors: Simon Booth, Brian McKnight, Tom Isaacson, Shelton Austin, Gregory Durbin
-
Patent number: 11610051Abstract: An NLP analysis method based on identification of common terms is disclosed. The improved NLP analysis can separate different parts of a patent claim into discrete claim segments based on the common terms. A user interface that corresponds to a flowchart allows the user to drag and drop the claim segments to form complex relationships, which is used to generate a patent specification.Type: GrantFiled: September 8, 2020Date of Patent: March 21, 2023Assignee: Rowan TELS Corp.Inventors: Simon Booth, Brian McKnight, Tom Isaacson, Shelton Austin, Gregory Durbin
-
Publication number: 20220391597Abstract: Disclosed are systems, apparatuses, processes, and computer-readable media to convert apparatus and method claims into patent application disclosure.Type: ApplicationFiled: May 26, 2022Publication date: December 8, 2022Inventors: Simon Booth, Brian McKnight, Gregory Durbin, Tom Isaacson, Shelton Austin
-
Publication number: 20220382983Abstract: Disclosed are systems, apparatuses, processes, and computer-readable media to convert apparatus and method claims into patent application disclosure. A process includes receiving a claim to be included in a patent application; separating the claim into a plurality of regions based on breakpoint; analyzing each region using a natural language processor; identifying at least one phrase within each region; determining a type of the at least one phrase, the type of phrasing including one of a functional phrase and an descriptive phrase; and creating text for the at least one phrase to be used in a complete sentence based on the type of the at least one phrase. The disclosed method can create content irrespective of statutory type of the claim and different methods and user interfaces to convert claims into descriptions.Type: ApplicationFiled: January 11, 2022Publication date: December 1, 2022Inventor: Simon Booth
-
Publication number: 20220377059Abstract: One example system for providing long-term key management for end-to-end encryption of videoconferencing information includes a processor and at least one memory device. The memory device includes code for causing the processor to generate one or more persistent cryptographic keys for a specific client device. A persistent key can be stored in or on the specific client device. A mapping of the key to a client device identifier can be transmitted to the video conference provider and can enable the video conference provider to set up videoconferences with per client encryption. A processor at the video conference provider can distribute the key for each client device to one or more participants in a videoconference to enable the client devices to end-to-end encrypt the videoconference.Type: ApplicationFiled: May 21, 2021Publication date: November 24, 2022Applicant: Zoom Video Communications, Inc.Inventors: Karan Lyons, Simon Booth
-
Publication number: 20220377057Abstract: One disclosed example involves a client device joining a videoconferencing meeting in which there is end-to-end encryption, where the end-to-end encryption is implemented by the client devices participating in the meting using a meeting key provided by the meeting host. Thereafter, the client device receives a public key of an asymmetric key pair corresponding to the host of the meeting, where the public key is different from the meeting key. The client device then generates a security code based on the public key and output the security code on a display device. The security code can be compared to another security code generated by another client device participating in the meeting to verify if the meeting is secure. The client device may also receive encrypted videoconferencing data, decrypt it using the meeting key, and output the decrypted videoconferencing data on the display device.Type: ApplicationFiled: May 21, 2021Publication date: November 24, 2022Applicant: Zoom Video Communications, Inc.Inventors: Karan LYONS, Simon Booth
-
Publication number: 20220376895Abstract: One disclosed example method includes a leader client device associated with a leader participant generating a meeting key for a video meeting joined by multiple participants. For each participant, the leader client device obtains a long-term public key and a cryptographic signature associated with the participant. The leader client device verifies the cryptographic signature of the participant based on the long-term public key and the cryptographic signature. If the verification is successful, the leader client device encrypts the meeting key for the participant using a short-term private key generated by the leader client device, a short-term public key of the participant, a meeting identifier, and a user identifier identifying the participant. The leader client device further publishes the encrypted meeting key for the participant on the meeting system. The leader client device encrypts and decrypts meeting data communicated with other participants based on the meeting key.Type: ApplicationFiled: May 21, 2021Publication date: November 24, 2022Inventors: Simon Booth, Karan Lyons
-
Publication number: 20220075929Abstract: An NLP analysis method based on identification of common terms is disclosed. The improved NLP analysis can separate different parts of a patent claim into discrete claim segments based on the common terms. A user interface that corresponds to a flowchart allows the user to drag and drop the claim segments to form complex relationships, which is used to generate a patent specification.Type: ApplicationFiled: September 8, 2020Publication date: March 10, 2022Inventors: Simon Booth, Brian McKnight, Tom Isaacson, Shelton Austin, Gregory Durbin
-
Patent number: 10761774Abstract: Various aspects include methods for managing memory subsystems on a computing device. Various aspect methods may include determining a period of time to force a memory subsystem on the computing device into a low power mode, inhibiting memory access requests to the memory subsystem during the determined period of time, forcing the memory subsystem into the low power mode for the determined period of time, and executing the memory access requests to the memory subsystem inhibited during the determined period of time in response to expiration of the determined period of time.Type: GrantFiled: April 3, 2018Date of Patent: September 1, 2020Assignee: Qualcomm IncorporatedInventors: Olivier Alavoine, Sejoong Lee, Tauseef Kazi, Simon Booth, Edoardo Regini, Renatas Jakushokas, Saurabh Patodia, Jeffrey Gemar, Michael Hawjing Lo, Vinod Chamarty, Boris Andreev, Tao Shen, Aravind Bhaskara, Wenbiao Wang, Stephen Molloy
-
Publication number: 20200195977Abstract: An exemplary method for intelligent compression defines a threshold value for a temperature reading generated by a temperature sensor. Data blocks received into the compression module are compressed according to either a first mode or a second mode, the selection of which is determined based on a comparison of the active level for the temperature reading to the defined threshold value. The first compression mode may be associated with a lossless compression algorithm while the second compression mode is associated with a lossy compression algorithm. Or, both the first compression mode and the second compression mode may be associated with a lossless compression algorithm, however, for the first compression mode the received data blocks are produced at a default high quality level setting while for the second compression mode the received data blocks are produced at a reduced quality level setting.Type: ApplicationFiled: February 26, 2020Publication date: June 18, 2020Inventors: SERAG GADELRAB, CHINCHUAN CHIU, MOINUL KHAN, KYLE ERNEWEIN, TOM LONGO, SIMON BOOTH, MEGHAL VARIA, MILIVOJE ALEKSIC
-
Patent number: 10609418Abstract: An exemplary method for intelligent compression defines a threshold value for a temperature reading generated by a temperature sensor. Data blocks received into the compression module are compressed according to either a first mode or a second mode, the selection of which is determined based on a comparison of the active level for the temperature reading to the defined threshold value. The first compression mode may be associated with a lossless compression algorithm while the second compression mode is associated with a lossy compression algorithm. Or, both the first compression mode and the second compression mode may be associated with a lossless compression algorithm, however, for the first compression mode the received data blocks are produced at a default high quality level setting while for the second compression mode the received data blocks are produced at a reduced quality level setting.Type: GrantFiled: April 18, 2017Date of Patent: March 31, 2020Assignee: QUALCOMM IncorporatedInventors: Serag Gadelrab, Chinchuan Chiu, Moinul Khan, Kyle Ernewein, Tom Longo, Simon Booth, Meghal Varia, Milivoje Aleksic
-
Patent number: 10484685Abstract: An exemplary method for intelligent compression defines a threshold value for a key performance indicator. Based on the key performance indicator value, data blocks generated by a producer component may be scaled down to reduce power and/or bandwidth consumption when being compressed according to a lossless compression module. The compressed data blocks are then stored in a memory component along with metadata that signals the scaling factor used prior to compression. Consumer components later retrieving the compressed data blocks from the memory component may decompress the data blocks and upscale, if required, based on the scaling factor signaled by the metadata.Type: GrantFiled: April 18, 2017Date of Patent: November 19, 2019Assignee: QUALCOMM IncorporatedInventors: Serag Gadelrab, Chinchuan Chiu, Moinul Khan, Kyle Ernewein, Tom Longo, Simon Booth, Meghal Varia, Milivoje Aleksic, King-Chung Lai
-
Patent number: 10110852Abstract: Disclosed herein are methods, systems, and techniques for creating media conferencing layouts that are intelligent (i.e., based on some underlying principle to enhance user-perceived conference quality) and persistent (i.e., consistent within a call and from one call to the next).Type: GrantFiled: June 13, 2016Date of Patent: October 23, 2018Assignee: Polycom, Inc.Inventors: Everett Hiller, Jim Darrah, Jimmy Carter, Satyanarayana Damisetti, Simon Booth, Jesse Coleman, Frank Lacombe