Patents by Inventor STEVEN TODD KIRSCH
STEVEN TODD KIRSCH has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250036801Abstract: According to an embodiment of the present invention, a method for using information in conjunction with a data repository includes encrypting data associated with the information with an encryption key, sending at least the encrypted data to the data repository, and possibly deleting the information. The method also includes receiving a request for the information from a remote device, and sending a request for the encrypted data to the data repository. The method further includes receiving the encrypted data from the data repository, decrypting the encrypted data using the encryption key, and sending the information to the remote device.Type: ApplicationFiled: April 30, 2024Publication date: January 30, 2025Applicant: Neustar, Inc.Inventor: Steven Todd KIRSCH
-
Patent number: 11972013Abstract: According to an embodiment of the present invention, a method for using information in conjunction with a data repository includes encrypting data associated with the information with an encryption key, sending at least the encrypted data to the data repository, and possibly deleting the information. The method also includes receiving a request for the information from a remote device, and sending a request for the encrypted data to the data repository. The method further includes receiving the encrypted data from the data repository, decrypting the encrypted data using the encryption key, and sending the information to the remote device.Type: GrantFiled: July 1, 2014Date of Patent: April 30, 2024Assignee: NEUSTAR, INC.Inventor: Steven Todd Kirsch
-
Publication number: 20240022431Abstract: A method for disabling a device associated with a virtual identity may include receiving, from the device, a request to use the virtual identity, where the request that may include a passcode guess and a device identifier. The method may also include determining that the passcode guess does not authorize use of the virtual identity and incrementing a number of incorrect passcode guesses received within a time interval. The method may additionally include determining that the number of incorrect passcode guesses received within the time interval is greater than or equal to a threshold. The method may further include storing an indication that subsequent requests associated with the device identifier should not authorize use of the virtual identity.Type: ApplicationFiled: September 25, 2023Publication date: January 18, 2024Applicant: Neustar, Inc.Inventor: Steven Todd KIRSCH
-
Patent number: 11818272Abstract: A method for disabling a device associated with a virtual identity may include receiving, from the device, a request to use the virtual identity, where the request that may include a passcode guess and a device identifier. The method may also include determining that the passcode guess does not authorize use of the virtual identity and incrementing a number of incorrect passcode guesses received within a time interval. The method may additionally include determining that the number of incorrect passcode guesses received within the time interval is greater than or equal to a threshold. The method may further include storing an indication that subsequent requests associated with the device identifier should not authorize use of the virtual identity.Type: GrantFiled: May 18, 2021Date of Patent: November 14, 2023Assignee: NEUSTAR, INC.Inventor: Steven Todd Kirsch
-
Publication number: 20220109578Abstract: A method for disabling a device associated with a virtual identity may include receiving, from the device, a request to use the virtual identity, where the request that may include a passcode guess and a device identifier. The method may also include determining that the passcode guess does not authorize use of the virtual identity and incrementing a number of incorrect passcode guesses received within a time interval. The method may additionally include determining that the number of incorrect passcode guesses received within the time interval is greater than or equal to a threshold. The method may further include storing an indication that subsequent requests associated with the device identifier should not authorize use of the virtual identity.Type: ApplicationFiled: May 18, 2021Publication date: April 7, 2022Applicant: Neustar, Inc.Inventor: Steven Todd Kirsch
-
Patent number: 11012240Abstract: A method for disabling a device associated with a virtual identity may include receiving, from the device, a request to use the virtual identity, where the request that may include a passcode guess and a device identifier. The method may also include determining that the passcode guess does not authorize use of the virtual identity and incrementing a number of incorrect passcode guesses received within a time interval. The method may additionally include determining that the number of incorrect passcode guesses received within the time interval is greater than or equal to a threshold. The method may further include storing an indication that subsequent requests associated with the device identifier should not authorize use of the virtual identity.Type: GrantFiled: June 7, 2018Date of Patent: May 18, 2021Assignee: Neustar, Inc.Inventor: Steven Todd Kirsch
-
Publication number: 20160261413Abstract: A method for authenticating communications may include registering the first device by receiving a device public key and a repository public key that are specific to the second device. The method may also include authenticating a communication from the first device by receiving the communication, a first digital signature generated by the first device using a device private key, and a second digital signature generated by the secure repository using a repository private key. The second digital signature may be generated by the secure repository only after the first device is authenticated by the secure repository. The method may further include authenticating the first digital signature using the device public key, authenticating the second digital signature using the repository public key, and authenticating the communication based on authenticating the first digital signature and authenticating the second digital signature.Type: ApplicationFiled: May 16, 2016Publication date: September 8, 2016Applicant: ONEID INC.Inventor: Steven Todd Kirsch
-
Patent number: 9344413Abstract: A method for disabling a device associated with a virtual identity may include receiving, from the device, a request to use the virtual identity, where the request that may include a passcode guess and a device identifier. The method may also include determining that the passcode guess does not authorize use of the virtual identity and incrementing a number of incorrect passcode guesses received within a time interval. The method may additionally include determining that the number of incorrect passcode guesses received within the time interval is greater than or equal to a threshold. The method may further include storing an indication that subsequent requests associated with the device identifier should not authorize use of the virtual identity.Type: GrantFiled: January 18, 2013Date of Patent: May 17, 2016Assignee: ONEID, INC.Inventor: Steven Todd Kirsch
-
Patent number: 9215223Abstract: A method for authorizing a virtual identity using an access device may include sending, from an access device, a request to a resource through a network. The method may also include accessing a resource challenge that is acceptable to the resource and sending the resource challenge to an identity repository. The method may additionally include receiving, from the identity repository, a first signed resource challenge and signing the resource challenge to generate a second signed resource challenge. The method may further include sending an authorization for the virtual identity to the resource through the network. The authorization may include the first signed resource challenge and the second signed resource challenge.Type: GrantFiled: January 18, 2013Date of Patent: December 15, 2015Assignee: ONEID INC.Inventor: Steven Todd Kirsch
-
Patent number: 9203819Abstract: A method of pairing an unregistered device with a virtual identity may include, at a first repository: receiving a request from the unregistered device, sending a pairing code and an identifier to the unregistered device, receiving the pairing code from a registered device, and sending the identifier to the registered device. The method may also include, at a second repository, receiving the pairing code and secret information from the registered device, receiving the pairing code in a transmission associated with the unregistered device, associating the unregistered device with the virtual identity using the pairing code, and sending the secret information to the unregistered device.Type: GrantFiled: January 18, 2013Date of Patent: December 1, 2015Assignee: ONEID INC.Inventors: James Lewis Fenton, Adam Back, Steven Todd Kirsch
-
Publication number: 20150088754Abstract: According to an embodiment of the present invention, a method for using information in conjunction with a data repository includes encrypting data associated with the information with an encryption key, sending at least the encrypted data to the data repository, and possibly deleting the information. The method also includes receiving a request for the information from a remote device, and sending a request for the encrypted data to the data repository. The method further includes receiving the encrypted data from the data repository, decrypting the encrypted data using the encryption key, and sending the information to the remote device.Type: ApplicationFiled: July 1, 2014Publication date: March 26, 2015Applicant: ONEID INC.Inventor: Steven Todd Kirsch
-
Patent number: 8769304Abstract: According to an embodiment of the present invention, a method for using information in conjunction with a data repository includes encrypting data associated with the information with an encryption key, sending at least the encrypted data to the data repository, and possibly deleting the information. The method also includes receiving a request for the information from a remote device, and sending a request for the encrypted data to the data repository. The method further includes receiving the encrypted data from the data repository, decrypting the encrypted data using the encryption key, and sending the information to the remote device.Type: GrantFiled: June 15, 2012Date of Patent: July 1, 2014Assignee: OneID Inc.Inventor: Steven Todd Kirsch
-
Publication number: 20130246272Abstract: A method of providing secure information for a transaction between an access device and a relying party device may include sending, from the relying party device to the identity repository, a first transmission. The first transmission may include the identifier. The identifier may be associated with a user account and the user account may be maintained by an identity repository. The first transmission may also include an information request. The method may also include sending, from the identity repository to the access device, a second transmission including a request to authorize the transaction. The method may additionally include sending, from the access device to the identity repository, a third transmission including an indication that the transaction has been authorized. The method may further include sending, from the identity repository to the relying party device, a fourth transmission comprising information responsive to the information request.Type: ApplicationFiled: March 12, 2013Publication date: September 19, 2013Applicant: ONEID INC.Inventor: STEVEN TODD KIRSCH
-
Publication number: 20130246280Abstract: A method of processing a digital invoice may include receiving, at the access device, a digital invoice for the transaction; sending, from the access device to an identity repository, information associated with the digital invoice; receiving, from the identity repository, a first signature for the digital invoice; providing, by the access device, a second signature for the digital invoice; and sending, from the access device, the first signature and the second signature for use in the transaction.Type: ApplicationFiled: March 12, 2013Publication date: September 19, 2013Applicant: ONEID, INC.Inventor: STEVEN TODD KIRSCH
-
Publication number: 20120323786Abstract: According to an embodiment of the present invention, a method of authorizing a transaction includes providing a processor, receiving a request for a proposed transaction from an entity, and retrieving a list of devices associated with the entity. The method also includes transmitting a notification related to the proposed transaction to the devices associated with the entity. The method further includes determining, using the processor, (a) that an approval is received from all the devices associated with the entity, or (b) that a predetermined time period has expired, and (c) transmitting an approval of the proposed transaction to a transaction processor. Or, determining, using the processor, (a) that a rejection is received from one or more of the devices associated with the entity; and (b) transmitting a disapproval of the proposed transaction to the transaction processor.Type: ApplicationFiled: June 15, 2012Publication date: December 20, 2012Applicant: OneID Inc.Inventor: Steven Todd Kirsch
-
Publication number: 20120323717Abstract: According to an embodiment of the present invention, a method for determining a transaction authentication level includes receiving transaction information associated with a transaction between a user and a relying party, receiving relying party preferences, and determining a relying party authentication level based on the transaction information and the relying party preferences. The method also includes accessing user preferences, and determining a user authentication level based the transaction information and the user preferences. The method further includes determining the transaction authentication level using the user authentication level and the relying party authentication level.Type: ApplicationFiled: June 15, 2012Publication date: December 20, 2012Applicant: OneID, Inc.Inventor: STEVEN TODD KIRSCH
-
Publication number: 20120324242Abstract: According to an embodiment of the present invention, a method for using information in conjunction with a data repository includes encrypting data associated with the information with an encryption key, sending at least the encrypted data to the data repository, and possibly deleting the information. The method also includes receiving a request for the information from a remote device, and sending a request for the encrypted data to the data repository. The method further includes receiving the encrypted data from the data repository, decrypting the encrypted data using the encryption key, and sending the information to the remote device.Type: ApplicationFiled: June 15, 2012Publication date: December 20, 2012Applicant: OneID Inc.Inventor: STEVEN TODD KIRSCH