Patents by Inventor Stephen Borza

Stephen Borza has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240296699
    Abstract: Biometrics are increasingly used to provide authentication and/or verification of a user in many security and financial applications for example. However, “spoof attacks” through presentation of biometric artefacts that are “false” allow attackers to fool these biometric verification systems. Accordingly, it would be beneficial to further differentiate the acquired biometric characteristics into feature spaces relating to live and non-living biometrics to prevent non-living biometric credentials triggering biometric verification. The inventors have established a variety of “liveness” detection methodologies which can block either low complexity spoofs or more advanced spoofs. Such techniques may provide for monitoring of responses to challenges discretely or in combination with additional aspects such as the timing of user's responses, depth detection within acquired images, comparison of other images from other cameras with database data etc.
    Type: Application
    Filed: May 13, 2024
    Publication date: September 5, 2024
    Inventors: LAURENCE HAMID, STEPHEN BORZA
  • Patent number: 11983964
    Abstract: Biometrics are increasingly used to provide authentication and/or verification of a user in many security and financial applications for example. However, “spoof attacks” through presentation of biometric artefacts that are “false” allow attackers to fool these biometric verification systems. Accordingly, it would be beneficial to further differentiate the acquired biometric characteristics into feature spaces relating to live and non-living biometrics to prevent non-living biometric credentials triggering biometric verification. The inventors have established a variety of “liveness” detection methodologies which can block either low complexity spoofs or more advanced spoofs. Such techniques may provide for monitoring of responses to challenges discretely or in combination with additional aspects such as the timing of user's responses, depth detection within acquired images, comparison of other images from other cameras with database data etc.
    Type: Grant
    Filed: February 13, 2023
    Date of Patent: May 14, 2024
    Inventors: Laurence Hamid, Stephen Borza
  • Patent number: 11704939
    Abstract: Biometrics are increasingly used to provide authentication and/or verification of a user in many security and financial applications for example. However, “spoof attacks” through presentation of biometric artefacts that are “false” allow attackers to fool these biometric verification systems. Accordingly, it would be beneficial to further differentiate the acquired biometric characteristics into feature spaces relating to live and non-living biometrics to prevent non-living biometric credentials triggering biometric verification. The inventors have established a variety of “liveness” detection methodologies which can block either low complexity spoofs or more advanced spoofs. Such techniques may provide for monitoring of responses to challenges discretely or in combination with additional aspects such as the timing of user's responses, depth detection within acquired images, comparison of other images from other cameras with database data etc.
    Type: Grant
    Filed: July 12, 2021
    Date of Patent: July 18, 2023
    Inventors: Laurence Hamid, Stephen Borza
  • Publication number: 20230186686
    Abstract: Biometrics are increasingly used to provide authentication and/or verification of a user in many security and financial applications for example. However, “spoof attacks” through presentation of biometric artefacts that are “false” allow attackers to fool these biometric verification systems. Accordingly, it would be beneficial to further differentiate the acquired biometric characteristics into feature spaces relating to live and non-living biometrics to prevent non-living biometric credentials triggering biometric verification. The inventors have established a variety of “liveness” detection methodologies which can block either low complexity spoofs or more advanced spoofs. Such techniques may provide for monitoring of responses to challenges discretely or in combination with additional aspects such as the timing of user's responses, depth detection within acquired images, comparison of other images from other cameras with database data etc.
    Type: Application
    Filed: February 13, 2023
    Publication date: June 15, 2023
    Inventors: LAURENCE HAMID, STEPHEN BORZA
  • Publication number: 20210374736
    Abstract: Short-range wireless protocols whilst leveraging enhanced security protocols, encryption techniques, and range raises alternate issues. For example, a user's smartphone would identify all the checkout POS terminals within range whilst the checkout POS terminal would identify all Bluetooth enabled devices within range. Accordingly, it would be beneficial to provide solution that allow for connection between a defined PED and a defined POS terminal within an overall environment of multiple PEDs and POS terminals. It would be further beneficial for the solution to remove the requirements of selecting PEDs and/or POS terminals and the ability to establish a connection between a predetermined device, e.g. a POS terminal or asset, amongst multiple POS terminals or assets.
    Type: Application
    Filed: August 4, 2021
    Publication date: December 2, 2021
    Inventors: LAURENCE HAMID, STEPHEN BORZA
  • Publication number: 20210334570
    Abstract: Biometrics are increasingly used to provide authentication and/or verification of a user in many security and financial applications for example. However, “spoof attacks” through presentation of biometric artefacts that are “false” allow attackers to fool these biometric verification systems. Accordingly, it would be beneficial to further differentiate the acquired biometric characteristics into feature spaces relating to live and non-living biometrics to prevent non-living biometric credentials triggering biometric verification. The inventors have established a variety of “liveness” detection methodologies which can block either low complexity spoofs or more advanced spoofs. Such techniques may provide for monitoring of responses to challenges discretely or in combination with additional aspects such as the timing of user's responses, depth detection within acquired images, comparison of other images from other cameras with database data etc.
    Type: Application
    Filed: July 12, 2021
    Publication date: October 28, 2021
    Inventors: LAURENCE HAMID, STEPHEN BORZA
  • Patent number: 11093772
    Abstract: Biometrics are increasingly used to provide authentication and/or verification of a user in many security and financial applications for example. However, “spoof attacks” through presentation of biometric artefacts that are “false” allow attackers to fool these biometric verification systems. Accordingly, it would be beneficial to further differentiate the acquired biometric characteristics into feature spaces relating to live and non-living biometrics to prevent non-living biometric credentials triggering biometric verification. The inventors have established a variety of “liveness” detection methodologies which can block either low complexity spoofs or more advanced spoofs. Such techniques may provide for monitoring of responses to challenges discretely or in combination with additional aspects such as the timing of user's responses, depth detection within acquired images, comparison of other images from other cameras with database data etc.
    Type: Grant
    Filed: June 11, 2019
    Date of Patent: August 17, 2021
    Inventors: Laurence Hamid, Stephen Borza
  • Patent number: 10686602
    Abstract: Whilst portable electronic devices such as smartphones have become ubiquitous for billions of users their primarily uses are consuming content or generating limited low complexity data. In contrast, laptops, desktop PCs etc. allow users to enter extended and/or complex content due to ergonomic user interfaces such as keyboard and mouse. Moving data requires either a third electronic device, e.g. a USB memory drive, or remotely storing the content. Accordingly, it would be beneficial to provide users with the benefit of entering and generating content on one or more electronic systems supporting ergonomic and user compatible haptic interfaces with the ability to store this upon their PED, e.g. smartphone. It would be further beneficial to provide the user also with a means to enter information into applications upon their PED through such external interfaces rather than the haptic interface of their PED, e.g. typically a small touchscreen.
    Type: Grant
    Filed: December 18, 2017
    Date of Patent: June 16, 2020
    Assignee: BLUINK LTD.
    Inventors: Laurence Hamid, Stephen Borza
  • Patent number: 10681081
    Abstract: In order to capture electronic information provided by a user to another user different third parties seek to download tracking software, viruses etc. to the user's computer systems. These may include, but are not limited to, message intercepting, email logging, hacking, spamming, phishing, spyware, malware, keyloggers, screen capturing, Trojan horses, WWW robots (BOTs or bots), IP spoofing, man-in-the-middle attacks, worms and viruses. Whilst within the prior art methodologies exist to protect the message by converting the plaintext at the sender's terminal to ciphertext for transmission before it is re-converted to plaintext at the receiver's (or recipient's) terminal once decrypted the message content, now in plaintext is accessible to malware, Trojan horse software, etc. upon the recipient's terminal allowing its contents to be acquired and transmitted without the recipient's and/or sender's knowledge.
    Type: Grant
    Filed: November 10, 2015
    Date of Patent: June 9, 2020
    Inventors: Laurence Hamid, Stephen Borza
  • Publication number: 20190377963
    Abstract: Biometrics are increasingly used to provide authentication and/or verification of a user in many security and financial applications for example. However, “spoof attacks” through presentation of biometric artefacts that are “false” allow attackers to fool these biometric verification systems. Accordingly, it would be beneficial to further differentiate the acquired biometric characteristics into feature spaces relating to live and non-living biometrics to prevent non-living biometric credentials triggering biometric verification. The inventors have established a variety of “liveness” detection methodologies which can block either low complexity spoofs or more advanced spoofs. Such techniques may provide for monitoring of responses to challenges discretely or in combination with additional aspects such as the timing of user's responses, depth detection within acquired images, comparison of other images from other cameras with database data etc.
    Type: Application
    Filed: June 11, 2019
    Publication date: December 12, 2019
    Inventors: LAURENCE HAMID, STEPHEN BORZA
  • Publication number: 20190205874
    Abstract: Short-range wireless protocols whilst leveraging enhanced security protocols, encryption techniques, and range raises alternate issues. For example, a user's smartphone would identify all the checkout POS terminals within range whilst the checkout POS terminal would identify all Bluetooth enabled devices within range. Accordingly, it would be beneficial to provide solution that allow for connection between a defined PED and a defined POS terminal within an overall environment of multiple PEDs and POS terminals. It would be further beneficial for the solution to remove the requirements of selecting PEDs and/or POS terminals and the ability to establish a connection between a predetermined device, e.g. a POS terminal or asset, amongst multiple POS terminals or assets.
    Type: Application
    Filed: January 2, 2019
    Publication date: July 4, 2019
    Inventors: Laurence HAMID, Stephen Borza
  • Publication number: 20180123799
    Abstract: Whilst portable electronic devices such as smartphones have become ubiquitous for billions of users their primarily uses are consuming content or generating limited low complexity data. In contrast, laptops, desktop PCs etc. allow users to enter extended and/or complex content due to ergonomic user interfaces such as keyboard and mouse. Moving data requires either a third electronic device, e.g. a USB memory drive, or remotely storing the content. Accordingly, it would be beneficial to provide users with the benefit of entering and generating content on one or more electronic systems supporting ergonomic and user compatible haptic interfaces with the ability to store this upon their PED, e.g. smartphone. It would be further beneficial to provide the user also with a means to enter information into applications upon their PED through such external interfaces rather than the haptic interface of their PED, e.g. typically a small touchscreen.
    Type: Application
    Filed: December 18, 2017
    Publication date: May 3, 2018
    Inventors: Laurence Hamid, Stephen Borza
  • Patent number: 9866388
    Abstract: While portable electronic devices such as smartphones have become ubiquitous for billions of users their primarily uses are consuming content or generating limited low complexity data. In contrast, laptops, desktop PCs etc. allow users to enter extended and/or complex content due to ergonomic user interfaces such as keyboard and mouse. Moving data requires either a third electronic device, e.g. a USB memory drive, or remotely storing the content. Accordingly, it would be beneficial to provide users with the benefit of entering and generating content on one or more electronic systems supporting ergonomic and user compatible haptic interfaces with the ability to store this upon their PED, e.g. smartphone. It would be further beneficial to provide the user also with a means to enter information into applications upon their PED through such external interfaces rather than the haptic interface of their PED, e.g. typically a small touchscreen.
    Type: Grant
    Filed: November 20, 2015
    Date of Patent: January 9, 2018
    Assignee: BluInk Ltd.
    Inventors: Laurence Hamid, Stephen Borza
  • Publication number: 20160148597
    Abstract: Whilst portable electronic devices such as smartphones have become ubiquitous for billions of users their primarily uses are consuming content or generating limited low complexity data. In contrast, laptops, desktop PCs etc. allow users to enter extended and/or complex content due to ergonomic user interfaces such as keyboard and mouse. Moving data requires either a third electronic device, e.g. a USB memory drive, or remotely storing the content. Accordingly, it would be beneficial to provide users with the benefit of entering and generating content on one or more electronic systems supporting ergonomic and user compatible haptic interfaces with the ability to store this upon their PED, e.g. smartphone. It would be further beneficial to provide the user also with a means to enter information into applications upon their PED through such external interfaces rather than the haptic interface of their PED, e.g. typically a small touchscreen.
    Type: Application
    Filed: November 20, 2015
    Publication date: May 26, 2016
    Inventors: Laurence Hamid, Stephen Borza
  • Publication number: 20160134642
    Abstract: In order to capture electronic information provided by a user to another user different third parties seek to download tracking software, viruses etc. to the user's computer systems. These may include, but are not limited to, message intercepting, email logging, hacking, spamming, phishing, spyware, malware, keyloggers, screen capturing, Trojan horses, WWW robots (BOTs or bots), IP spoofing, man-in-the-middle attacks, worms and viruses. Whilst within the prior art methodologies exist to protect the message by converting the plaintext at the sender's terminal to ciphertext for transmission before it is re-converted to plaintext at the receiver's (or recipient's) terminal once decrypted the message content, now in plaintext is accessible to malware, Trojan horse software, etc. upon the recipient's terminal allowing its contents to be acquired and transmitted without the recipient's and/or sender's knowledge.
    Type: Application
    Filed: November 10, 2015
    Publication date: May 12, 2016
    Inventors: Laurence Hamid, Stephen Borza
  • Publication number: 20130090968
    Abstract: Organizations must manage employee schedules to ensure that adequate personnel are present as required, regulatory requirements met, and costs tracked/minimized. Prior art systems are taught as internal to an organization and hence do not address part-time or temporary employees who have multiple conflicts on their time. An employee scheduling software system is taught that accesses multiple extrinsic databases hosting schedules relating to an employee allowing scheduling to avoid external conflicts for the employer and allowing employees to respond to schedules as well as trade/auction with other employees with confidence. Further, by associating a portable electronic device to the employee and hosting a scheduling application on these devices the employees are able to review/modify/trade/auction shifts with increased flexibility and employers are provided with a more accurate clocking in/out process to verify the employee's attendance and completion of their shift.
    Type: Application
    Filed: October 8, 2012
    Publication date: April 11, 2013
    Inventor: Stephen Borza