Patents by Inventor Simon Booth

Simon Booth has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240089096
    Abstract: One disclosed example method includes a leader client device associated with a leader participant generating a meeting key for a video meeting joined by multiple participants. For each participant, the leader client device obtains a long-term public key and a cryptographic signature associated with the participant. The leader client device verifies the cryptographic signature of the participant based on the long-term public key and the cryptographic signature. If the verification is successful, the leader client device encrypts the meeting key for the participant using a short-term private key generated by the leader client device, a short-term public key of the participant, a meeting identifier, and a user identifier identifying the participant. The leader client device further publishes the encrypted meeting key for the participant on the meeting system. The leader client device encrypts and decrypts meeting data communicated with other participants based on the meeting key.
    Type: Application
    Filed: November 16, 2023
    Publication date: March 14, 2024
    Applicant: Zoom Video Communications, Inc.
    Inventors: Simon Booth, Karan Lyons
  • Publication number: 20240031345
    Abstract: One disclosed example involves a client device joining a videoconferencing meeting in which there is end-to-end encryption, where the end-to-end encryption is implemented by the client devices participating in the meting using a meeting key provided by the meeting host. Thereafter, the client device receives a public key of an asymmetric key pair corresponding to the host of the meeting, where the public key is different from the meeting key. The client device then generates a security code based on the public key and output the security code on a display device. The security code can be compared to another security code generated by another client device participating in the meeting to verify if the meeting is secure. The client device may also receive encrypted videoconferencing data, decrypt it using the meeting key, and output the decrypted videoconferencing data on the display device.
    Type: Application
    Filed: August 11, 2023
    Publication date: January 25, 2024
    Applicant: Zoom Video Communications, Inc.
    Inventors: Karan Lyons, Simon Booth
  • Patent number: 11882215
    Abstract: One disclosed example method includes a leader client device associated with a leader participant generating a meeting key for a video meeting joined by multiple participants. For each participant, the leader client device obtains a long-term public key and a cryptographic signature associated with the participant. The leader client device verifies the cryptographic signature of the participant based on the long-term public key and the cryptographic signature. If the verification is successful, the leader client device encrypts the meeting key for the participant using a short-term private key generated by the leader client device, a short-term public key of the participant, a meeting identifier, and a user identifier identifying the participant. The leader client device further publishes the encrypted meeting key for the participant on the meeting system. The leader client device encrypts and decrypts meeting data communicated with other participants based on the meeting key.
    Type: Grant
    Filed: May 21, 2021
    Date of Patent: January 23, 2024
    Assignee: Zoom Video Communications, Inc.
    Inventors: Simon Booth, Karan Lyons
  • Patent number: 11765143
    Abstract: One disclosed example involves a client device joining a videoconferencing meeting in which there is end-to-end encryption, where the end-to-end encryption is implemented by the client devices participating in the meting using a meeting key provided by the meeting host. Thereafter, the client device receives a public key of an asymmetric key pair corresponding to the host of the meeting, where the public key is different from the meeting key. The client device then generates a security code based on the public key and output the security code on a display device. The security code can be compared to another security code generated by another client device participating in the meeting to verify if the meeting is secure. The client device may also receive encrypted videoconferencing data, decrypt it using the meeting key, and output the decrypted videoconferencing data on the display device.
    Type: Grant
    Filed: May 21, 2021
    Date of Patent: September 19, 2023
    Assignee: Zoom Video Communications, Inc.
    Inventors: Karan Lyons, Simon Booth
  • Publication number: 20230289527
    Abstract: Disclosed are systems, apparatuses, processes, and computer-readable media to converging state between generated and revised documents. A method includes executing a first instance of a user interface for creating a plurality of paragraphs from a set of claims; in response to the execution of the first instance of the user interface, creating the plurality of paragraphs based on input into the user interface; inserting the plurality of paragraphs into a document associated with the document processing application; after a claim in the set of claims is edited in the document, executing a second instance of the user interface; and in response to the execution of the second instance of the user interface, revising the plurality of paragraphs based on input into the user interface during the second instance. The paragraphs can be revised based on disclosed mechanisms to embed metadata within the XML content.
    Type: Application
    Filed: March 8, 2022
    Publication date: September 14, 2023
    Inventor: Simon Booth
  • Publication number: 20230222286
    Abstract: An NLP analysis method based on identification of common terms is disclosed. The improved NLP analysis can separate different parts of a patent claim into discrete claim segments based on the common terms. A user interface that corresponds to a flowchart allows the user to drag and drop the claim segments to form complex relationships, which is used to generate a patent specification.
    Type: Application
    Filed: March 8, 2023
    Publication date: July 13, 2023
    Inventors: Simon Booth, Brian McKnight, Tom Isaacson, Shelton Austin, Gregory Durbin
  • Patent number: 11610051
    Abstract: An NLP analysis method based on identification of common terms is disclosed. The improved NLP analysis can separate different parts of a patent claim into discrete claim segments based on the common terms. A user interface that corresponds to a flowchart allows the user to drag and drop the claim segments to form complex relationships, which is used to generate a patent specification.
    Type: Grant
    Filed: September 8, 2020
    Date of Patent: March 21, 2023
    Assignee: Rowan TELS Corp.
    Inventors: Simon Booth, Brian McKnight, Tom Isaacson, Shelton Austin, Gregory Durbin
  • Publication number: 20220391597
    Abstract: Disclosed are systems, apparatuses, processes, and computer-readable media to convert apparatus and method claims into patent application disclosure.
    Type: Application
    Filed: May 26, 2022
    Publication date: December 8, 2022
    Inventors: Simon Booth, Brian McKnight, Gregory Durbin, Tom Isaacson, Shelton Austin
  • Publication number: 20220382983
    Abstract: Disclosed are systems, apparatuses, processes, and computer-readable media to convert apparatus and method claims into patent application disclosure. A process includes receiving a claim to be included in a patent application; separating the claim into a plurality of regions based on breakpoint; analyzing each region using a natural language processor; identifying at least one phrase within each region; determining a type of the at least one phrase, the type of phrasing including one of a functional phrase and an descriptive phrase; and creating text for the at least one phrase to be used in a complete sentence based on the type of the at least one phrase. The disclosed method can create content irrespective of statutory type of the claim and different methods and user interfaces to convert claims into descriptions.
    Type: Application
    Filed: January 11, 2022
    Publication date: December 1, 2022
    Inventor: Simon Booth
  • Publication number: 20220377057
    Abstract: One disclosed example involves a client device joining a videoconferencing meeting in which there is end-to-end encryption, where the end-to-end encryption is implemented by the client devices participating in the meting using a meeting key provided by the meeting host. Thereafter, the client device receives a public key of an asymmetric key pair corresponding to the host of the meeting, where the public key is different from the meeting key. The client device then generates a security code based on the public key and output the security code on a display device. The security code can be compared to another security code generated by another client device participating in the meeting to verify if the meeting is secure. The client device may also receive encrypted videoconferencing data, decrypt it using the meeting key, and output the decrypted videoconferencing data on the display device.
    Type: Application
    Filed: May 21, 2021
    Publication date: November 24, 2022
    Applicant: Zoom Video Communications, Inc.
    Inventors: Karan LYONS, Simon Booth
  • Publication number: 20220376895
    Abstract: One disclosed example method includes a leader client device associated with a leader participant generating a meeting key for a video meeting joined by multiple participants. For each participant, the leader client device obtains a long-term public key and a cryptographic signature associated with the participant. The leader client device verifies the cryptographic signature of the participant based on the long-term public key and the cryptographic signature. If the verification is successful, the leader client device encrypts the meeting key for the participant using a short-term private key generated by the leader client device, a short-term public key of the participant, a meeting identifier, and a user identifier identifying the participant. The leader client device further publishes the encrypted meeting key for the participant on the meeting system. The leader client device encrypts and decrypts meeting data communicated with other participants based on the meeting key.
    Type: Application
    Filed: May 21, 2021
    Publication date: November 24, 2022
    Inventors: Simon Booth, Karan Lyons
  • Publication number: 20220377059
    Abstract: One example system for providing long-term key management for end-to-end encryption of videoconferencing information includes a processor and at least one memory device. The memory device includes code for causing the processor to generate one or more persistent cryptographic keys for a specific client device. A persistent key can be stored in or on the specific client device. A mapping of the key to a client device identifier can be transmitted to the video conference provider and can enable the video conference provider to set up videoconferences with per client encryption. A processor at the video conference provider can distribute the key for each client device to one or more participants in a videoconference to enable the client devices to end-to-end encrypt the videoconference.
    Type: Application
    Filed: May 21, 2021
    Publication date: November 24, 2022
    Applicant: Zoom Video Communications, Inc.
    Inventors: Karan Lyons, Simon Booth
  • Publication number: 20220075929
    Abstract: An NLP analysis method based on identification of common terms is disclosed. The improved NLP analysis can separate different parts of a patent claim into discrete claim segments based on the common terms. A user interface that corresponds to a flowchart allows the user to drag and drop the claim segments to form complex relationships, which is used to generate a patent specification.
    Type: Application
    Filed: September 8, 2020
    Publication date: March 10, 2022
    Inventors: Simon Booth, Brian McKnight, Tom Isaacson, Shelton Austin, Gregory Durbin
  • Patent number: 10761774
    Abstract: Various aspects include methods for managing memory subsystems on a computing device. Various aspect methods may include determining a period of time to force a memory subsystem on the computing device into a low power mode, inhibiting memory access requests to the memory subsystem during the determined period of time, forcing the memory subsystem into the low power mode for the determined period of time, and executing the memory access requests to the memory subsystem inhibited during the determined period of time in response to expiration of the determined period of time.
    Type: Grant
    Filed: April 3, 2018
    Date of Patent: September 1, 2020
    Assignee: Qualcomm Incorporated
    Inventors: Olivier Alavoine, Sejoong Lee, Tauseef Kazi, Simon Booth, Edoardo Regini, Renatas Jakushokas, Saurabh Patodia, Jeffrey Gemar, Michael Hawjing Lo, Vinod Chamarty, Boris Andreev, Tao Shen, Aravind Bhaskara, Wenbiao Wang, Stephen Molloy
  • Publication number: 20200195977
    Abstract: An exemplary method for intelligent compression defines a threshold value for a temperature reading generated by a temperature sensor. Data blocks received into the compression module are compressed according to either a first mode or a second mode, the selection of which is determined based on a comparison of the active level for the temperature reading to the defined threshold value. The first compression mode may be associated with a lossless compression algorithm while the second compression mode is associated with a lossy compression algorithm. Or, both the first compression mode and the second compression mode may be associated with a lossless compression algorithm, however, for the first compression mode the received data blocks are produced at a default high quality level setting while for the second compression mode the received data blocks are produced at a reduced quality level setting.
    Type: Application
    Filed: February 26, 2020
    Publication date: June 18, 2020
    Inventors: SERAG GADELRAB, CHINCHUAN CHIU, MOINUL KHAN, KYLE ERNEWEIN, TOM LONGO, SIMON BOOTH, MEGHAL VARIA, MILIVOJE ALEKSIC
  • Patent number: 10609418
    Abstract: An exemplary method for intelligent compression defines a threshold value for a temperature reading generated by a temperature sensor. Data blocks received into the compression module are compressed according to either a first mode or a second mode, the selection of which is determined based on a comparison of the active level for the temperature reading to the defined threshold value. The first compression mode may be associated with a lossless compression algorithm while the second compression mode is associated with a lossy compression algorithm. Or, both the first compression mode and the second compression mode may be associated with a lossless compression algorithm, however, for the first compression mode the received data blocks are produced at a default high quality level setting while for the second compression mode the received data blocks are produced at a reduced quality level setting.
    Type: Grant
    Filed: April 18, 2017
    Date of Patent: March 31, 2020
    Assignee: QUALCOMM Incorporated
    Inventors: Serag Gadelrab, Chinchuan Chiu, Moinul Khan, Kyle Ernewein, Tom Longo, Simon Booth, Meghal Varia, Milivoje Aleksic
  • Patent number: 10484685
    Abstract: An exemplary method for intelligent compression defines a threshold value for a key performance indicator. Based on the key performance indicator value, data blocks generated by a producer component may be scaled down to reduce power and/or bandwidth consumption when being compressed according to a lossless compression module. The compressed data blocks are then stored in a memory component along with metadata that signals the scaling factor used prior to compression. Consumer components later retrieving the compressed data blocks from the memory component may decompress the data blocks and upscale, if required, based on the scaling factor signaled by the metadata.
    Type: Grant
    Filed: April 18, 2017
    Date of Patent: November 19, 2019
    Assignee: QUALCOMM Incorporated
    Inventors: Serag Gadelrab, Chinchuan Chiu, Moinul Khan, Kyle Ernewein, Tom Longo, Simon Booth, Meghal Varia, Milivoje Aleksic, King-Chung Lai
  • Patent number: 10110852
    Abstract: Disclosed herein are methods, systems, and techniques for creating media conferencing layouts that are intelligent (i.e., based on some underlying principle to enhance user-perceived conference quality) and persistent (i.e., consistent within a call and from one call to the next).
    Type: Grant
    Filed: June 13, 2016
    Date of Patent: October 23, 2018
    Assignee: Polycom, Inc.
    Inventors: Everett Hiller, Jim Darrah, Jimmy Carter, Satyanarayana Damisetti, Simon Booth, Jesse Coleman, Frank Lacombe
  • Publication number: 20180302625
    Abstract: An exemplary method for intelligent compression defines a threshold value for a key performance indicator. Based on the key performance indicator value, data blocks generated by a producer component may be scaled down to reduce power and/or bandwidth consumption when being compressed according to a lossless compression module. The compressed data blocks are then stored in a memory component along with metadata that signals the scaling factor used prior to compression. Consumer components later retrieving the compressed data blocks from the memory component may decompress the data blocks and upscale, if required, based on the scaling factor signaled by the metadata.
    Type: Application
    Filed: April 18, 2017
    Publication date: October 18, 2018
    Inventors: SERAG GADELRAB, CHINCHUAN CHIU, MOINUL KHAN, KYLE ERNEWEIN, TOM LONGO, SIMON BOOTH, MEGHAL VARIA, MILIVOJE ALEKSIC, KING-CHUNG LAI
  • Publication number: 20180302624
    Abstract: An exemplary method for intelligent compression defines a threshold value for a temperature reading generated by a temperature sensor. Data blocks received into the compression module are compressed according to either a first mode or a second mode, the selection of which is determined based on a comparison of the active level for the temperature reading to the defined threshold value. The first compression mode may be associated with a lossless compression algorithm while the second compression mode is associated with a lossy compression algorithm. Or, both the first compression mode and the second compression mode may be associated with a lossless compression algorithm, however, for the first compression mode the received data blocks are produced at a default high quality level setting while for the second compression mode the received data blocks are produced at a reduced quality level setting.
    Type: Application
    Filed: April 18, 2017
    Publication date: October 18, 2018
    Inventors: SERAG GADELRAB, CHINCHUAN CHIU, MOINUL KHAN, KYLE ERNEWEIN, TOM LONGO, SIMON BOOTH, MEGHAL VARIA, MILIVOJE ALEKSIC