Patents by Inventor Trevor Miranda
Trevor Miranda has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10152715Abstract: A technique for the detection of an unauthorized wireless communication device includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect suspected illegal activity. If illegal activity is suspected by the analysis, an alert is generated for a system administrator. The predefined parameters associate illegal activity with; data that includes credit card numbers and expiration dates, credit card transaction logging information, non-discoverable devices, activity after store hours, exceedingly long activity, etc.Type: GrantFiled: November 1, 2017Date of Patent: December 11, 2018Assignee: Symbol Technologies, LLCInventors: Puneet Batta, Trevor Miranda, Jacob Thomas
-
Patent number: 10055581Abstract: A technique for locating a wireless communication attack includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect a communication attempt by a suspected criminal device to an illicit device. If the communication attempt by the suspected criminal device is detected by the analysis, a communication to the criminal device is controlled so as to delay completion of the communication to the criminal device in order to provide time to locate the criminal device.Type: GrantFiled: June 24, 2014Date of Patent: August 21, 2018Assignee: Symbol Technologies, LLCInventors: Puneet Batta, Jason T Harris, Trevor Miranda, Jacob Thomas
-
Publication number: 20180089686Abstract: A technique for the detection of an unauthorized wireless communication device includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect suspected illegal activity. If illegal activity is suspected by the analysis, an alert is generated for a system administrator. The predefined parameters associate illegal activity with; data that includes credit card numbers and expiration dates, credit card transaction logging information, non-discoverable devices, activity after store hours, exceedingly long activity, etc.Type: ApplicationFiled: November 1, 2017Publication date: March 29, 2018Inventors: Puneet Batta, Trevor Miranda, Jacob Thomas
-
Patent number: 9836746Abstract: A technique for the detection of an unauthorized wireless communication device includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect suspected illegal activity. If illegal activity is suspected by the analysis, an alert is generated for a system administrator. The predefined parameters associate illegal activity with; data that includes credit card numbers and expiration dates, credit card transaction logging information, non-discoverable devices, activity after store hours, exceedingly long activity, etc.Type: GrantFiled: November 9, 2016Date of Patent: December 5, 2017Assignee: Symbol Technologies, LLCInventors: Puneet Batta, Trevor Miranda, Jacob Thomas
-
Publication number: 20170061439Abstract: A technique for the detection of an unauthorized wireless communication device includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect suspected illegal activity. If illegal activity is suspected by the analysis, an alert is generated for a system administrator. The predefined parameters associate illegal activity with; data that includes credit card numbers and expiration dates, credit card transaction logging information, non-discoverable devices, activity after store hours, exceedingly long activity, etc.Type: ApplicationFiled: November 9, 2016Publication date: March 2, 2017Inventors: Puneet Batta, Trevor Miranda, Jacob Thomas
-
Patent number: 9525689Abstract: A technique for the detection of an unauthorized wireless communication device includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect suspected illegal activity. If illegal activity is suspected by the analysis, an alert is generated for a system administrator. The predefined parameters associate illegal activity with; data that includes credit card numbers and expiration dates, credit card transaction logging information, non-discoverable devices, activity after store hours, exceedingly long activity, etc.Type: GrantFiled: March 25, 2014Date of Patent: December 20, 2016Assignee: Symbol Technologies, LLCInventors: Puneet Batta, Trevor Miranda, Jacob Thomas
-
Publication number: 20150371038Abstract: A technique for locating a wireless communication attack includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect a communication attempt by a suspected criminal device to an illicit device. If the communication attempt by the suspected criminal device is detected by the analysis, a communication to the criminal device is controlled so as to delay completion of the communication to the criminal device in order to provide time to locate the criminal device.Type: ApplicationFiled: June 24, 2014Publication date: December 24, 2015Inventors: Puneet Batta, Jason T. Harris, Trevor Miranda, Jacob Thomas
-
Publication number: 20150281236Abstract: A technique for the detection of an unauthorized wireless communication device includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect suspected illegal activity. If illegal activity is suspected by the analysis, an alert is generated for a system administrator. The predefined parameters associate illegal activity with; data that includes credit card numbers and expiration dates, credit card transaction logging information, non-discoverable devices, activity after store hours, exceedingly long activity, etc.Type: ApplicationFiled: March 25, 2014Publication date: October 1, 2015Applicant: SYMBOL TECHNOLOGIES, INC.Inventors: PUNEET BATTA, TREVOR MIRANDA, JACOB THOMAS
-
Patent number: 8352604Abstract: A technique for distributed propagation of data in a wireless communication network includes providing 600 a unique host identifier for each peer network entity in the wireless communication network, each host identifier having a length of B bits. A next step includes requesting 602 data from peer network entities using a request having a host identifier of the requesting network entity. A next step includes, if a peer network entity is hosting the requested data, comparing 608 the host identifiers of the requesting network entity and the peer network entity receiving the request to determine a match. A next step includes responding 610 to the request if a match is determined.Type: GrantFiled: October 28, 2010Date of Patent: January 8, 2013Assignee: Symbol Technologies, Inc.Inventors: Trevor Miranda, Puneet Batta
-
Publication number: 20120149367Abstract: A technique for synchronization of mobile device information in a wireless communication network includes associating 300 a mobile device (MD) to a first access point (AP). A next step includes transmitting 302 a roam notification message from the first AP to all APs in network. A next step includes associating 304 the MD to a second AP. A next step includes establishing 306 that the first and second APs are roaming neighbors. A next step includes building 308 a roaming neighbor list in the associated first and second APs for the MD, wherein the list includes those neighboring APs where the MD has been associated. A next step includes determining 310 that the MD is currently associated with an AP. A next step includes preemptively pushing 312 information about the MD to those APs in the list of the determined AP for synchronization.Type: ApplicationFiled: December 14, 2010Publication date: June 14, 2012Applicant: SYMBOL TECHNOLOGIES, INC.Inventors: Trevor Miranda, Nicholas S. Dade
-
Patent number: 8190150Abstract: A technique for synchronization of mobile device information in a wireless communication network includes associating 300 a mobile device (MD) to a first access point (AP). A next step includes transmitting 302 a roam notification message from the first AP to all APs in network. A next step includes associating 304 the MD to a second AP. A next step includes establishing 306 that the first and second APs are roaming neighbors. A next step includes building 308 a roaming neighbor list in the associated first and second APs for the MD, wherein the list includes those neighboring APs where the MD has been associated. A next step includes determining 310 that the MD is currently associated with an AP. A next step includes preemptively pushing 312 information about the MD to those APs in the list of the determined AP for synchronization.Type: GrantFiled: December 14, 2010Date of Patent: May 29, 2012Assignee: Symbol Technologies, Inc.Inventors: Trevor Miranda, Nicholas S. Dade
-
Publication number: 20120110183Abstract: A technique for distributed propagation of data in a wireless communication network includes providing 600 a unique host identifier for each peer network entity in the wireless communication network, each host identifier having a length of B bits. A next step includes requesting 602 data from peer network entities using a request having a host identifier of the requesting network entity. A next step includes, if a peer network entity is hosting the requested data, comparing 608 the host identifiers of the requesting network entity and the peer network entity receiving the request to determine a match. A next step includes responding 610 to the request if a match is determined.Type: ApplicationFiled: October 28, 2010Publication date: May 3, 2012Applicant: SYMBOL TECHNOLOGIES, INC.Inventors: Trevor Miranda, Puneet Batta
-
Patent number: 8171539Abstract: Apparatus and methods are provided for implementing a firewall in a network infrastructure component. A method comprises generating a search tree for a plurality of rules. The search tree comprises a first node having a first field bounds and a first set of rules of the plurality of rules, and a plurality of child nodes for the first node. Each child node has child field bounds based on an intersection of the first field bounds and the first set of rules, and each child node is assigned a respective subset of the first set of rules based on the respective child field bounds. The method further comprises receiving a first packet, identifying a first child node of the plurality of child nodes based on values for one or more fields of the first packet, and applying the respective subset of rules assigned to the first child node to the first packet.Type: GrantFiled: January 7, 2009Date of Patent: May 1, 2012Assignee: Symbol Technologies, Inc.Inventor: Trevor Miranda
-
Publication number: 20100175124Abstract: Apparatus and methods are provided for implementing a firewall in a network infrastructure component. A method comprises generating a search tree for a plurality of rules. The search tree comprises a first node having a first field bounds and a first set of rules of the plurality of rules, and a plurality of child nodes for the first node. Each child node has child field bounds based on an intersection of the first field bounds and the first set of rules, and each child node is assigned a respective subset of the first set of rules based on the respective child field bounds. The method further comprises receiving a first packet, identifying a first child node of the plurality of child nodes based on values for one or more fields of the first packet, and applying the respective subset of rules assigned to the first child node to the first packet.Type: ApplicationFiled: January 7, 2009Publication date: July 8, 2010Applicant: SYMBOL TECHNOLOGIES, INC.Inventor: Trevor Miranda
-
Patent number: 7336800Abstract: The present invention relates to a method, computer program product and a device for detecting watermarks in digital data for the purpose of electronic copyright management system. The invention includes transforming the original as well as unwatermarked data. Thereafter, tagging the resultant components of the transformed data using a pair of rows and columns. Then, selecting significant components in the said transformed data, transforming the suspected watermarked data and tagging the components in the transformed data. Further, selecting the tagged components from the transformed suspected watermarked data corresponding to those selected as significant in the original transformed data, and comparing said two groups of selected significant components to detect the watermarks.Type: GrantFiled: May 14, 2003Date of Patent: February 26, 2008Assignee: Indian Institute of Information TechnologyInventors: Trevor Miranda, Manindra Mohan
-
Publication number: 20040062394Abstract: The present invention relates to a method, computer program product and a device for detecting watermarks in digital data for the purpose of electronic copyright management system. The invention includes transforming the original as well as unwatermarked data. Thereafter, tagging the resultant components of the transformed data using a pair of rows and columns. Then, selecting significant components in the said transformed data, transforming the suspected watermarked data and tagging the components in the transformed data. Further, selecting the tagged components from the transformed suspected watermarked data corresponding to those selected as significant in the original transformed data, and comparing said two groups of selected significant components to detect the watermarks.Type: ApplicationFiled: May 14, 2003Publication date: April 1, 2004Applicant: Indian Institute of Information TechnologyInventors: Trevor Miranda, Manindra Mohan