Patents by Inventor Singam Sunder
Singam Sunder has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140082714Abstract: A method includes sending a faked authentication request from a client device wherein the faked authentication request includes identification credentials. A faked authentication request indicates that a reply message in response to the faked authentication request is to include data for updating a directory on the client device. A reply message is received at the client device in response to the faked authentication request. The reply message includes data for updating the directory. The directory is updated based, at least in part, on the data for updating the directory.Type: ApplicationFiled: November 25, 2013Publication date: March 20, 2014Applicant: iPass Inc.Inventors: Singam Sunder, Jeff S. Edgett, Roy David Albert
-
Patent number: 8606885Abstract: A method includes sending a faked authentication request from a client device wherein the faked authentication request includes identification credentials. A faked authentication request indicates that a reply message in response to the faked authentication request is to include data for updating a directory on the client device. A reply message is received at the client device in response to the faked authentication request. The reply message includes data for updating the directory. The directory is updated based, at least in part, on the data for updating the directory.Type: GrantFiled: June 5, 2003Date of Patent: December 10, 2013Assignee: iPass Inc.Inventors: Singam Sunder, Jeff Steven Edgett, Roy David Albert
-
Patent number: 7961884Abstract: A method of, and system for, changing encryption information in a computer network is provided. The method includes providing at least first cryptographic information and second cryptographic information. A first validity period is provided for the first cryptographic information and a second validity period is provided for the second cryptographic information wherein the first and second validity periods overlap.Type: GrantFiled: August 13, 2002Date of Patent: June 14, 2011Assignee: iPass Inc.Inventors: Jeff Steven Edgett, Singam Sunder
-
Patent number: 7921290Abstract: A method is provided to securely authenticate user credentials. The method includes encrypting a user credential with a public key at an access device wherein the public key is part of a public/private key pair suitable for use with an encryption algorithm. The encrypted network user credential is transmitted from the access device to a decryption server where it is decrypted with a private key, the private key being part of the public/private key pair suitable for use with the encryption algorithm. The decrypted user credential is then transmitted from the decryption server to an authentication server for verification. The decryption server typically forms part of a multi-party service access environment including a plurality of access providers, the method including decrypting the user credential of a user proximate an access provider associated with the user credential.Type: GrantFiled: April 5, 2002Date of Patent: April 5, 2011Inventors: Roy David Albert, Jeff Steven Edgett, Singam Sunder, James Marion Underwood
-
Patent number: 7792745Abstract: A method to facilitate the financial settlement of service access transactions between multiple parties commences with the automatic collection of data concerning multiple transactions from respective service providers (e.g., ISPs). The multiple transactions are between the multiple service providers and multiple service customers. Respective transaction values are automatically determined for each of the multiple transactions. Account payable balances are automatically updated for the multiple service providers, and account receivable balances are automatically updated for the service customers based on the respective transaction values for each of the multiple transactions.Type: GrantFiled: February 21, 2001Date of Patent: September 7, 2010Assignee: iPass Inc.Inventors: Jay Farhat, Alla Rozenfeld, Singam Sunder, Jeff Edgett, Can Vu
-
Patent number: 7761606Abstract: A method and system is provided to secure a connection application in a multi-party access environment including a plurality of service providers. The method includes generating a customized connection application, and cryptographically signing the customized connection application, the customized connection application being for installation on a client machine. In certain embodiments, the customized connection application is in the form of a self-extracting executable to automatically install the connection application on the client machine. The customized connection application may be signed using Authenticode technology.Type: GrantFiled: February 12, 2003Date of Patent: July 20, 2010Assignee: iPass Inc.Inventors: Singam Sunder, Jeff Edgett
-
Patent number: 7519695Abstract: A method and system are provided for monitoring service quality of at least one network connection point of a remote network connection service. The method includes establishing a network connection between a client device and the remote network connection service via the network connection point. The network connection point may be one of a plurality of remotely located network connection points. The method includes monitoring access performance of the network connection point to generate access performance data, and processing the access performance data to monitor the service quality of the network connection point.Type: GrantFiled: June 4, 2007Date of Patent: April 14, 2009Assignee: iPass Inc.Inventors: Jay Farhat, Alla Rozenfeld, Singam Sunder
-
Patent number: 7469341Abstract: A method of, and system for, associating a plurality of transaction data records generated in a service access system including a plurality of service providers is provided. The transaction data records are generated in response to a user accessing the system during a single user session. The method includes generating a unique session identification that is uniquely associated with the single user session and which is receivable by the service providers. The unique session identification is included in the transaction data record. The plurality of transaction data records is received at a transaction processing facility from the service providers and processes using the unique session identification of each transaction data record. In certain embodiments, the unique session identification is provided in a user identification string of each transaction data record when the user session is authentication.Type: GrantFiled: April 5, 2002Date of Patent: December 23, 2008Assignee: iPAss Inc.Inventors: Jeff Steven Edgett, Singam Sunder
-
Publication number: 20070239873Abstract: A method and system are provided for monitoring service quality of at least one network connection point of a remote network connection service. The method includes establishing a network connection between a client device and the remote network connection service via the network connection point. The network connection point may be one of a plurality of remotely located network connection points. The method includes monitoring access performance of the network connection point to generate access performance data, and processing the access performance data to monitor the service quality of the network connection point.Type: ApplicationFiled: June 4, 2007Publication date: October 11, 2007Inventors: Jay Farhat, Alla Rozenfeld, Singam Sunder
-
Patent number: 7240112Abstract: A method and system are provided for monitoring service quality of at least one network connection point of a remote network connection service. The method includes establishing a network connection between a client device and the remote network connection service via the network connection point. The network connection point may be one of a plurality of remotely located network connection points via any one of which access to the remote network connection service is obtainable. The method includes monitoring access performance of the network connection point to generate access performance data, and processing the access performance data thereby to monitor the service quality of the network connection point.Type: GrantFiled: May 9, 2005Date of Patent: July 3, 2007Assignee: iPass Inc.Inventors: Jay Farhat, Alla Rozenfeld, Singam Sunder
-
Patent number: 7191239Abstract: A method to manage a customized network connection application includes generating plurality of input interfaces to receive customization information pertaining to the customized network connection application. The customization information pertaining to the customized network connection application is received via the plurality of input interfaces. The customization information is then stored as a profile associated with the customized network connection application. The customized network connection application is automatically generated utilizing the profile, and distributed to at least one recipient.Type: GrantFiled: August 2, 2001Date of Patent: March 13, 2007Assignee: iPass Inc.Inventors: Alla Rozenfeld, Singam Sunder, Tuan Bui
-
Patent number: 6985945Abstract: A method and system are provided for monitoring service quality of at least one network connection point of a remote network connection service. The method includes establishing a network connection between a client device and the remote network connection service via the network connection point. The network connection point may be one of a plurality of remotely located network connection points via any one of which access to the remote network connection service is obtainable. The method includes monitoring access performance of the network connection point to generate access performance data, and processing the access performance data thereby to monitor the service quality of the network connection point.Type: GrantFiled: December 13, 2002Date of Patent: January 10, 2006Assignee: iPass, Inc.Inventors: Jay Farhat, Alla Rozenfeld, Singam Sunder
-
Publication number: 20050204036Abstract: A method and system are provided for monitoring service quality of at least one network connection point of a remote network connection service. The method includes establishing a network connection between a client device and the remote network connection service via the network connection point. The network connection point may be one of a plurality of remotely located network connection points via any one of which access to the remote network connection service is obtainable. The method includes monitoring access performance of the network connection point to generate access performance data, and processing the access performance data thereby to monitor the service quality of the network connection point.Type: ApplicationFiled: May 9, 2005Publication date: September 15, 2005Inventors: Jay Farhat, Alla Rozenfeld, Singam Sunder
-
Publication number: 20050055371Abstract: A method and system is provided for managing a network connection application. The method includes assigning a plurality of selection criteria to each connection point wherein each selection criteria bearing an associated selection weight. The connection points are then arranged in a prioritized order in a priority list used by the connection application to connect to any one of the connection points. The prioritized order is based on the selection criteria and associated selection weights. The prioritized list is then made available for use by the connection application. Each selection criteria may have an associated weight bias that influences the priority of the connection point. In certain embodiments, criteria and weight bias on the connection application may be updated or modified.Type: ApplicationFiled: June 5, 2003Publication date: March 10, 2005Inventors: Singam Sunder, Jeff Edgett, Roy Albert
-
Publication number: 20050021781Abstract: A method of, and system for, communicating data via a network access point is provided. The method includes receiving an authentication request from a client device at the access point wherein the access request includes identification credentials. The authentication request is then communicated to an authentication server and data associated with the authentication request is retrieved. A reply message is communicated to the access point that includes the data and that rejects the authentication request. The access point may service a wireless hotspot and, thus, a client device in the hotspot may identify the particular hotspot with which it is communicating.Type: ApplicationFiled: June 5, 2003Publication date: January 27, 2005Inventors: Singam Sunder, Jeff Edgett, Roy Albert
-
Publication number: 20040034771Abstract: A method of, and system for, changing encryption information in a computer network is provided. The method includes providing at least first cryptographic information and second cryptographic information. A first validity period is provided for the first cryptographic information and a second validity period is provided for the second cryptographic information wherein the first and second validity periods overlap.Type: ApplicationFiled: August 13, 2002Publication date: February 19, 2004Inventors: Jeff Steven Edgett, Singam Sunder
-
Publication number: 20030188160Abstract: A method and system are provided of updating a client file of a client application in a multi-party access environment including a plurality of service providers. The method includes generating at least one customized client update file, the client update file being customized for a client application of at least one of a plurality of users in the multi-party environment. Thereafter a secured signature file associated with the client update file is generated and communicated with the client update file to the plurality of web servers. At various points around the globe, the secured signature file and the client file update may be downloaded to update the client application. The secured signature file may be verified before installing the client update file.Type: ApplicationFiled: February 12, 2003Publication date: October 2, 2003Inventors: Singam Sunder, Jeff Edgett
-
Publication number: 20030182556Abstract: A method and system is provided to secure a connection application in a multi-party access environment including a plurality of service providers. The method includes generating a customized connection application, and cryptographically signing the customized connection application, the customized connection application being for installation on a client machine. In certain embodiments, the customized connection application is in the form of a self-extracting executable to automatically install the connection application on the client machine. The customized connection application may be signed using Authenticode technology.Type: ApplicationFiled: February 12, 2003Publication date: September 25, 2003Inventors: Singam Sunder, Jeff Edgett
-
Publication number: 20030097442Abstract: A method and system are provided for monitoring service quality of at least one network connection point of a roaming service access system. The method includes establishing a network connection between a client device and the roaming service access system via the network connection point. The network connection point may be one of a plurality of remotely located network connection points via any one of which access to the service access system is obtainable. The method includes monitoring access performance of the network connection point to generate access performance data, and processing the access performance data thereby to monitor the service quality of the network connection point.Type: ApplicationFiled: December 13, 2002Publication date: May 22, 2003Inventors: Jay Farhat, Alla Rozenfeld, Singam Sunder
-
Publication number: 20030065919Abstract: A method is provided of authenticating a user device requesting access to a computer system. The method includes encrypting current session data at a connection application of the user device via which a user requests access to the computer system, the current session data changing with each user request. The encrypted current session data is then included in user authentication data in an access request which is communicated in plain text which is then decrypted. Reference session data is then compared with the decrypted current session data and the user request is selectively categorized dependent upon the outcome of the comparison.Type: ApplicationFiled: April 5, 2002Publication date: April 3, 2003Inventors: Roy David Albert, Jeff Steven Edgett, Singam Sunder