Patents by Inventor Steven Viavant
Steven Viavant has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10235689Abstract: Processing of point of sale (“POS”) redemptions via a “tap” of a contactless device comprises a POS data collector that facilitates a connection with a contactless device. A merchant scans items for purchase using a POS scanner, which captures product identification information. The POS scanner forwards the product identification information to a POS terminal. The POS data collector intercepts the product identification information between the POS scanner and the POS terminal. A user taps the contactless device in the POS data collector's radio frequency field, and a communication channel is established between the contactless device and the POS data collector. The POS data collector identifies the user via the contactless device and identifies coupons, merchant offers, and other value-added services to redeem with the transaction. The POS data collector forwards this information to the POS terminal, the redemptions are applied to the transaction, and the communication is terminated.Type: GrantFiled: March 21, 2014Date of Patent: March 19, 2019Assignee: GOOGLE LLCInventors: Philipp Hertel, Paul Lee, Sheldon I. Walfish, Alexander W. Hertel, Steven Viavant, Dan Moisa, Gene Sokolov
-
Publication number: 20140207556Abstract: Processing of point of sale (“POS”) redemptions via a “tap” of a contactless device comprises a POS data collector that facilitates a connection with a contactless device. A merchant scans items for purchase using a POS scanner, which captures product identification information. The POS scanner forwards the product identification information to a POS terminal. The POS data collector intercepts the product identification information between the POS scanner and the POS terminal. A user taps the contactless device in the POS data collector's radio frequency field, and a communication channel is established between the contactless device and the POS data collector. The POS data collector identifies the user via the contactless device and identifies coupons, merchant offers, and other value-added services to redeem with the transaction. The POS data collector forwards this information to the POS terminal, the redemptions are applied to the transaction, and the communication is terminated.Type: ApplicationFiled: March 21, 2014Publication date: July 24, 2014Applicant: GOOGLE INC.Inventors: Philipp Hertel, Paul Lee, Sheldon I. Walfish, Alexander W. Hertel, Steven Viavant, Dan Moisa, Gene Sokolov
-
Publication number: 20130304553Abstract: Processing of point of sale (“POS”) redemptions via a “tap” of a contactless device comprises a POS data collector that facilitates a connection with a contactless device. A merchant scans items for purchase using a POS scanner, which captures product identification information. The POS scanner forwards the product identification information to a POS terminal. The POS data collector intercepts the product identification information between the POS scanner and the POS terminal. A user taps the contactless device in the POS data collector's radio frequency field, and a communication channel is established between the contactless device and the POS data collector. The POS data collector identifies the user via the contactless device and identifies coupons, merchant offers, and other value-added services to redeem with the transaction. The POS data collector forwards this information to the POS terminal, the redemptions are applied to the transaction, and the communication is terminated.Type: ApplicationFiled: May 9, 2012Publication date: November 14, 2013Applicant: GOOGLE Inc.Inventors: Philipp Hertel, Paul Lee, Sheldon I. Walfish, Alexander W. Hertel, Steven Viavant
-
Patent number: 7975288Abstract: One embodiment of the present invention provides a system for executing a command on a computer system. During operation, the system receives a signed command from a first quorum member at a security manager, wherein one or more quorum members must accept the command before the command is executed. Along with the command is data indicating which additional quorum members will be participating in a session, and which quorum persona they wish to invoke for the session. After verifying the signature, the system sends the command to a second quorum member, wherein the command is verified, or authenticated as originating from the first quorum member. Next, the system receives a signed response from the second quorum member, wherein the response indicates whether the second quorum member accepts or rejects the command. If the second quorum member accepts the command, the system sends the command to a native client which executes the command.Type: GrantFiled: May 2, 2006Date of Patent: July 5, 2011Assignee: Oracle International CorporationInventors: Steven Viavant, Sashikanth Chandrasekaran
-
Patent number: 7761914Abstract: One embodiment of the present invention provides a system that facilitates adjusting an audit state in a computing environment. During operation the system receives a key from a third-party at an audit system. Note that the key is associated with a corresponding audit-control profile. Next, the system validates the key, thereby authenticating the third-party. The system then identifies the audit-control profile that is associated with the key provided by the third-party. Finally, the system audits the target system in accordance with the corresponding audit-control profile.Type: GrantFiled: October 21, 2005Date of Patent: July 20, 2010Assignee: Oracle International CorporationInventor: Steven Viavant
-
Publication number: 20070261103Abstract: One embodiment of the present invention provides a system for executing a command on a computer system. During operation, the system receives a signed command from a first quorum member at a security manager, wherein one or more quorum members must accept the command before the command is executed. Along with the command is data indicating which additional quorum members will be participating in a session, and which quorum persona they wish to invoke for the session. After verifying the signature, the system sends the command to a second quorum member, wherein the command is verified, or authenticated as originating from the first quorum member. Next, the system receives a signed response from the second quorum member, wherein the response indicates whether the second quorum member accepts or rejects the command. If the second quorum member accepts the command, the system sends the command to a native client which executes the command.Type: ApplicationFiled: May 2, 2006Publication date: November 8, 2007Inventors: Steven Viavant, Sashikanth Chandrasekaran
-
Patent number: 7257623Abstract: One embodiment of the present invention provides a system that ensures an allowable client configuration for an application. During operation, the client sends a request to access the application to a server hosting the application. In response the request, the server downloads an analysis application to the client. Next, the client executes the analysis application, whereby the analysis application gathers configuration data that specifies a present configuration of the client. The system examines this configuration data to determine whether the client has a configuration that allows the application to execute on the client based on pre-established criteria. If the client has an allowable configuration, the system allows the client to execute the application.Type: GrantFiled: May 28, 2003Date of Patent: August 14, 2007Assignee: Oracle International CorporationInventors: Steven Viavant, Bruce Eimon, Leslie Gloyd, Joe McDonald, Jeffrey Lynn McReynolds
-
Publication number: 20070094141Abstract: One embodiment of the present invention provides a system that facilitates adjusting an audit state in a computing environment. During operation the system receives a key from a third-party at an audit system. Note that the key is associated with a corresponding audit-control profile. Next, the system validates the key, thereby authenticating the third-party. The system then identifies the audit-control profile that is associated with the key provided by the third-party. Finally, the system audits the target system in accordance with the corresponding audit-control profile.Type: ApplicationFiled: October 21, 2005Publication date: April 26, 2007Inventor: Steven Viavant
-
Publication number: 20060288035Abstract: Example systems, methodologies, media, and other embodiments are described herein that relate to database systems. In one example system embodiment, a logic can be configured to monitor transactions that are performed by a computer system and store data relating to the transactions in an data store that is maintained on an immutable storage medium. An indexing logic can be configured that generates one or more indexes for the data store where the one or more indexes are maintained on a mutable medium.Type: ApplicationFiled: June 16, 2005Publication date: December 21, 2006Applicant: ORACLE INTERNATIONAL CORPORATIONInventor: Steven Viavant
-
Publication number: 20040243691Abstract: One embodiment of the present invention provides a system that ensures an allowable client configuration for an application. During operation, the client sends a request to access the application to a server hosting the application. In response the request, the server downloads an analysis application to the client. Next, the client executes the analysis application, whereby the analysis application gathers configuration data that specifies a present configuration of the client. The system examines this configuration data to determine whether the client has a configuration that allows the application to execute on the client based on pre-established criteria. If the client has an allowable configuration, the system allows the client to execute the application.Type: ApplicationFiled: May 28, 2003Publication date: December 2, 2004Inventors: Steven Viavant, Bruce Eimon, Leslie Gloyd, Joe McDonald, Jeffrey Lynn McReynolds
-
Publication number: 20020184363Abstract: Techniques for measuring client-side performance include intercepting an item that is to be sent to a client process prior to the arrival of the item at the client process. The item is modified to produce a modified item that includes code. The code causes a processor on the client device to measure performance related to a service associated with the item. The code also causes the processor to perform one or more acts based on a measurement resulting from measuring performance. The modified item is sent to the client process.Type: ApplicationFiled: August 31, 2001Publication date: December 5, 2002Inventors: Steven Viavant, Arsalan Farooq, Jaydeep Marfatia, Manu Shukla
-
Patent number: 5784566Abstract: A system and a method are described for selecting and initiating security services for communication across computer networks. Negotiation is facilitated between nodes of a computer network to determine whether a security service is to be used, and if so, what particular method of providing the security service will be used. Communication with a wide range of different computer systems using different methods of providing various security services is thereby facilitated.Type: GrantFiled: January 11, 1996Date of Patent: July 21, 1998Assignee: Oracle CorporationInventors: Steven Viavant, Arthur A. Gleckler, Richard R. Wessman
-
Patent number: RE47620Abstract: One embodiment of the present invention provides a system that ensures an allowable client configuration for an application. During operation, the client sends a request to access the application to a server hosting the application. In response the request, the server downloads an analysis application to the client. Next, the client executes the analysis application, whereby the analysis application gathers configuration data that specifies a present configuration of the client. The system examines this configuration data to determine whether the client has a configuration that allows the application to execute on the client based on pre-established criteria. If the client has an allowable configuration, the system allows the client to execute the application.Type: GrantFiled: December 7, 2017Date of Patent: September 24, 2019Assignee: Oracle International CorporationInventors: Steven Viavant, Bruce Eimon, Leslie Gloyd, Joe McDonald, Jeffrey Lynn McReynolds, Lane Thomas Findley