Patents by Inventor Talbot Harty

Talbot Harty has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150101031
    Abstract: A device user being authenticated is determined to be in physical possession of the device according to data in one or more user input device buffers that indicates whether data received from a user input device is injected or is generated by physical manipulation of the user input device. If the events recorded in the buffer are not injected, the user entering the authentication data is determined to be in physical possession of the device and the user can be authenticated if the authentication data entered by the user matches predetermined reference data. Conversely, if the events are injected, the user is determined to not be in physical possession of the device and authentication fails regardless of whether the authentication data matches the predetermined reference data.
    Type: Application
    Filed: October 6, 2014
    Publication date: April 9, 2015
    Applicant: DEVICEAUTHORITY, INC.
    Inventors: Dono Harjanto, Talbot HARTY, Prakash CHANDRA, Antonius HADIPUTRA
  • Publication number: 20140359736
    Abstract: A dynamic device key that identifies and authenticates a device and its user includes data representing captured sound of the user speaking a disposable pass phrase. The convenient and secure authentication of voice recognition is combined with convenient and secure device authentication by including biometric voice-recognition of the user in the dynamic device key. During registration, the user speaks all elements of a collection from which disposable pass phrases can be composed. The resulting audio signals, representing the user's voice print as modified by background noise introduced by the device and the environment, are used as references for subsequent authentication. During authentication, a dynamic device key challenge specifies a number of device attributes, including pass phrases to be spoken by the device's user. The pass phrases may be selected in a randomized manner from the collection of disposable pass phrases.
    Type: Application
    Filed: April 29, 2014
    Publication date: December 4, 2014
    Applicant: DEVICEAUTHORITY, INC.
    Inventors: Talbot Harty, Dono Harjanto
  • Patent number: 8750827
    Abstract: A method for managing UMA communications within a local area network and a network controller includes establishing a first connection between a first UMA device and a LAN-based UMA network controller (LAN-UNC) and establishing a second connection between a second UMA device and the LAN-UNC. The first and second connections are carried over the local area network. The first and second UMA devices are connected to the same local area network. The method provides establishing a third connection between the LAN-UNC and a UMA network controller (UNC). The UNC is connected to an external network and the third connection extends over the external network. The method includes transporting packets received using the first and second connections to the UNC using the third connection. Packets received using the third connection are transported to the first UMA device using the first connection and to the second UMA device using the second connection.
    Type: Grant
    Filed: June 14, 2012
    Date of Patent: June 10, 2014
    Assignee: Network Equipment Technologies, Inc.
    Inventors: Troy T. Pummill, Kevin Isacks, Terry Hardie, Talbot Harty
  • Publication number: 20140068738
    Abstract: Device attributes corresponding to hardware and system configuration and characteristics of the user of the device are associated with adjustment logic, e.g., according to various types and classes of attributes. A hierarchical authentication process provides highly detailed and accurate authentication of a device, including device identification, device authentication, user authentication, and attribute adjustment. If the device is not properly identified, authentication fails. Otherwise, device authentication is attempted. If device authentication fails, all authentication fails. Otherwise, the user of the device is authenticated. If user authentication fails, authentication of the device fails. Otherwise, adjustment logic is used to adjust attributes for subsequent authentication.
    Type: Application
    Filed: June 20, 2013
    Publication date: March 6, 2014
    Inventors: Talbot HARTY, Dono HARJANTO, Karim KADDOURA
  • Publication number: 20140047238
    Abstract: A device authentication server assigns unique synthetic device attributes to a device such that the device can use actual hardware and system configuration attributes and the assigned synthetic device attributes to form a device identifier that is unique, even among homogeneous devices for which actual, accessible hardware and system configuration attributes are not distinct.
    Type: Application
    Filed: June 20, 2013
    Publication date: February 13, 2014
    Inventors: Talbot HARTY, Dono HARJANTO, Karim KADDOURA
  • Publication number: 20140006780
    Abstract: A client computer returns to a server, not only form data entered by the user representing an action to be taken by the server, but also a hash of the form data that is generated by a cryptographic hash function prior to returning the form data. As a result, the hash is generated before any man-in-the-browser proxy has the opportunity to modify the form data. The server receives the hash of the form data generated before any man-in-the-browser proxy had access to the form data. If a hash of the form data does not match the received hash, the server detects modification of the form data, perhaps by a man-in-the-browser proxy, and accordingly declines to perform the requested action.
    Type: Application
    Filed: June 17, 2013
    Publication date: January 2, 2014
    Inventors: Talbot HARTY, Dono HARJANTO, Karim KADDOURA, Prakash CHANDRA
  • Publication number: 20130064369
    Abstract: A method for managing UMA communications within a local area network and a network controller are disclosed. The method includes establishing a first connection between a first UMA device and a LAN-based UMA network controller (LAN-UNC) and establishing a second connection between a second UMA device and the LAN-UNC. The first and second connections are carried over the local area network. The first and second UMA devices are connected to the same local area network. The method provides establishing a third connection between the LAN-UNC and a UMA network controller (UNC). The UNC is connected to an external network and the third connection extends over the external network. The method includes transporting packets received using the first and second connections to the UNC using the third connection. Packets received using the third connection are transported to the first UMA device using the first connection and to the second UMA device using the second connection.
    Type: Application
    Filed: June 14, 2012
    Publication date: March 14, 2013
    Applicant: Network Technologies, Inc.
    Inventors: Troy T. Pummill, Kevin Isacks, Terry Hardie, Talbot Harty
  • Patent number: 8380167
    Abstract: A method for managing UMA communications within a local area network and a network controller are disclosed. The method includes establishing a first connection to a first UMA device over the LAN and establishing a second connection to a UMA network controller (UNC) over an external network. The first UMA device is connected to the local area network and the UNC is connected to the external network. Packets received from the first UMA device using the first connection are sent to the UNC using the second connection. Similarly, packets received from the UNC using the second connection are sent to the first UMA device using the first connection. The first connection may include a first IPsec tunnel and the second connection may include a second IPsec tunnel. The external network may include the internet.
    Type: Grant
    Filed: May 10, 2006
    Date of Patent: February 19, 2013
    Assignee: Network Equipment Technologies, Inc.
    Inventors: Troy T. Pummill, Kevin Isacks, Terry Hardie, Talbot Harty
  • Patent number: 8224333
    Abstract: A method for managing UMA communications within a local area network and a network controller are disclosed. The method includes establishing a first connection between a first UMA device and a LAN-based UMA network controller (LAN-UNC) and establishing a second connection between a second UMA device and the LAN-UNC. The first and second connections are carried over the local area network. The first and second UMA devices are connected to the same local area network. The method provides establishing a third connection between the LAN-UNC and a UMA network controller (UNC). The UNC is connected to an external network and the third connection extends over the external network. The method includes transporting packets received using the first and second connections to the UNC using the third connection. Packets received using the third connection are transported to the first UMA device using the first connection and to the second UMA device using the second connection.
    Type: Grant
    Filed: May 10, 2006
    Date of Patent: July 17, 2012
    Assignee: Network Equipment Technologies, Inc.
    Inventors: Troy T Pummill, Kevin Isacks, Terry Hardie, Talbot Harty
  • Patent number: 7885659
    Abstract: A method for managing Unlicensed Mobile Access (UMA) communications within a local area network and a LAN-based UMA network controller are disclosed. The method includes monitoring packets received from a first UMA device connected to the local area network and detecting whether they represent a call between the first UMA device and a second UMA device. The method also includes determining whether the second UMA device is connected to the local area network. If the packets represent a call between the first and second UMA devices and the second UMA device is connected to the local area network, packets representing audio data are maintained within the local area network.
    Type: Grant
    Filed: May 10, 2006
    Date of Patent: February 8, 2011
    Assignee: Network Equipment Technologies, Inc.
    Inventors: Troy T. Pummill, Kevin Isacks, Terry Hardie, Talbot Harty
  • Publication number: 20060276139
    Abstract: A method for managing UMA communications within a local area network and a network controller are disclosed. The method includes establishing a first connection between a first UMA device and a LAN-based UMA network controller (LAN-UNC) and establishing a second connection between a second UMA device and the LAN-UNC. The first and second connections are carried over the local area network. The first and second UMA devices are connected to the same local area network. The method provides establishing a third connection between the LAN-UNC and a UMA network controller (UNC). The UNC is connected to an external network and the third connection extends over the external network. The method includes transporting packets received using the first and second connections to the UNC using the third connection. Packets received using the third connection are transported to the first UMA device using the first connection and to the second UMA device using the second connection.
    Type: Application
    Filed: May 10, 2006
    Publication date: December 7, 2006
    Applicant: Network Equipment Technologies, Inc.
    Inventors: Troy Pummill, Kevin Isacks, Terry Hardie, Talbot Harty
  • Publication number: 20060276138
    Abstract: A method for managing UMA communications within a local area network and a network controller are disclosed. The method includes establishing a first connection to a first UMA device over the LAN and establishing a second connection to a UMA network controller (UNC) over an external network. The first UMA device is connected to the local area network and the UNC is connected to the external network. Packets received from the first UMA device using the first connection are sent to the UNC using the second connection. Similarly, packets received from the UNC using the second connection are sent to the first UMA device using the first connection. The first connection may include a first IPsec tunnel and the second connection may include a second IPsec tunnel. The external network may include the internet.
    Type: Application
    Filed: May 10, 2006
    Publication date: December 7, 2006
    Applicant: Network Equipment Technologies, Inc.
    Inventors: Troy Pummill, Kevin Isacks, Terry Hardie, Talbot Harty
  • Publication number: 20060276137
    Abstract: A method for managing Unlicensed Mobile Access (UMA) communications within a local area network and a LAN-based UMA network controller are disclosed. The method includes monitoring packets received from a first UMA device connected to the local area network and detecting whether they represent a call between the first UMA device and a second UMA device. The method also includes determining whether the second UMA device is connected to the local area network. If the packets represent a call between the first and second UMA devices and the second UMA device is connected to the local area network, packets representing audio data are maintained within the local area network.
    Type: Application
    Filed: May 10, 2006
    Publication date: December 7, 2006
    Applicant: Network Equipment Technologies, Inc.
    Inventors: Troy Pummill, Kevin Isacks, Terry Hardie, Talbot Harty