Patents by Inventor Trevor Miranda

Trevor Miranda has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10152715
    Abstract: A technique for the detection of an unauthorized wireless communication device includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect suspected illegal activity. If illegal activity is suspected by the analysis, an alert is generated for a system administrator. The predefined parameters associate illegal activity with; data that includes credit card numbers and expiration dates, credit card transaction logging information, non-discoverable devices, activity after store hours, exceedingly long activity, etc.
    Type: Grant
    Filed: November 1, 2017
    Date of Patent: December 11, 2018
    Assignee: Symbol Technologies, LLC
    Inventors: Puneet Batta, Trevor Miranda, Jacob Thomas
  • Patent number: 10055581
    Abstract: A technique for locating a wireless communication attack includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect a communication attempt by a suspected criminal device to an illicit device. If the communication attempt by the suspected criminal device is detected by the analysis, a communication to the criminal device is controlled so as to delay completion of the communication to the criminal device in order to provide time to locate the criminal device.
    Type: Grant
    Filed: June 24, 2014
    Date of Patent: August 21, 2018
    Assignee: Symbol Technologies, LLC
    Inventors: Puneet Batta, Jason T Harris, Trevor Miranda, Jacob Thomas
  • Publication number: 20180089686
    Abstract: A technique for the detection of an unauthorized wireless communication device includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect suspected illegal activity. If illegal activity is suspected by the analysis, an alert is generated for a system administrator. The predefined parameters associate illegal activity with; data that includes credit card numbers and expiration dates, credit card transaction logging information, non-discoverable devices, activity after store hours, exceedingly long activity, etc.
    Type: Application
    Filed: November 1, 2017
    Publication date: March 29, 2018
    Inventors: Puneet Batta, Trevor Miranda, Jacob Thomas
  • Patent number: 9836746
    Abstract: A technique for the detection of an unauthorized wireless communication device includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect suspected illegal activity. If illegal activity is suspected by the analysis, an alert is generated for a system administrator. The predefined parameters associate illegal activity with; data that includes credit card numbers and expiration dates, credit card transaction logging information, non-discoverable devices, activity after store hours, exceedingly long activity, etc.
    Type: Grant
    Filed: November 9, 2016
    Date of Patent: December 5, 2017
    Assignee: Symbol Technologies, LLC
    Inventors: Puneet Batta, Trevor Miranda, Jacob Thomas
  • Publication number: 20170061439
    Abstract: A technique for the detection of an unauthorized wireless communication device includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect suspected illegal activity. If illegal activity is suspected by the analysis, an alert is generated for a system administrator. The predefined parameters associate illegal activity with; data that includes credit card numbers and expiration dates, credit card transaction logging information, non-discoverable devices, activity after store hours, exceedingly long activity, etc.
    Type: Application
    Filed: November 9, 2016
    Publication date: March 2, 2017
    Inventors: Puneet Batta, Trevor Miranda, Jacob Thomas
  • Patent number: 9525689
    Abstract: A technique for the detection of an unauthorized wireless communication device includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect suspected illegal activity. If illegal activity is suspected by the analysis, an alert is generated for a system administrator. The predefined parameters associate illegal activity with; data that includes credit card numbers and expiration dates, credit card transaction logging information, non-discoverable devices, activity after store hours, exceedingly long activity, etc.
    Type: Grant
    Filed: March 25, 2014
    Date of Patent: December 20, 2016
    Assignee: Symbol Technologies, LLC
    Inventors: Puneet Batta, Trevor Miranda, Jacob Thomas
  • Publication number: 20150371038
    Abstract: A technique for locating a wireless communication attack includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect a communication attempt by a suspected criminal device to an illicit device. If the communication attempt by the suspected criminal device is detected by the analysis, a communication to the criminal device is controlled so as to delay completion of the communication to the criminal device in order to provide time to locate the criminal device.
    Type: Application
    Filed: June 24, 2014
    Publication date: December 24, 2015
    Inventors: Puneet Batta, Jason T. Harris, Trevor Miranda, Jacob Thomas
  • Publication number: 20150281236
    Abstract: A technique for the detection of an unauthorized wireless communication device includes monitoring of Bluetooth® communications activity by a Bluetooth® capable communication device. Any monitored communication activity is analyzed against parameters that are predefined to detect suspected illegal activity. If illegal activity is suspected by the analysis, an alert is generated for a system administrator. The predefined parameters associate illegal activity with; data that includes credit card numbers and expiration dates, credit card transaction logging information, non-discoverable devices, activity after store hours, exceedingly long activity, etc.
    Type: Application
    Filed: March 25, 2014
    Publication date: October 1, 2015
    Applicant: SYMBOL TECHNOLOGIES, INC.
    Inventors: PUNEET BATTA, TREVOR MIRANDA, JACOB THOMAS
  • Patent number: 8352604
    Abstract: A technique for distributed propagation of data in a wireless communication network includes providing 600 a unique host identifier for each peer network entity in the wireless communication network, each host identifier having a length of B bits. A next step includes requesting 602 data from peer network entities using a request having a host identifier of the requesting network entity. A next step includes, if a peer network entity is hosting the requested data, comparing 608 the host identifiers of the requesting network entity and the peer network entity receiving the request to determine a match. A next step includes responding 610 to the request if a match is determined.
    Type: Grant
    Filed: October 28, 2010
    Date of Patent: January 8, 2013
    Assignee: Symbol Technologies, Inc.
    Inventors: Trevor Miranda, Puneet Batta
  • Publication number: 20120149367
    Abstract: A technique for synchronization of mobile device information in a wireless communication network includes associating 300 a mobile device (MD) to a first access point (AP). A next step includes transmitting 302 a roam notification message from the first AP to all APs in network. A next step includes associating 304 the MD to a second AP. A next step includes establishing 306 that the first and second APs are roaming neighbors. A next step includes building 308 a roaming neighbor list in the associated first and second APs for the MD, wherein the list includes those neighboring APs where the MD has been associated. A next step includes determining 310 that the MD is currently associated with an AP. A next step includes preemptively pushing 312 information about the MD to those APs in the list of the determined AP for synchronization.
    Type: Application
    Filed: December 14, 2010
    Publication date: June 14, 2012
    Applicant: SYMBOL TECHNOLOGIES, INC.
    Inventors: Trevor Miranda, Nicholas S. Dade
  • Patent number: 8190150
    Abstract: A technique for synchronization of mobile device information in a wireless communication network includes associating 300 a mobile device (MD) to a first access point (AP). A next step includes transmitting 302 a roam notification message from the first AP to all APs in network. A next step includes associating 304 the MD to a second AP. A next step includes establishing 306 that the first and second APs are roaming neighbors. A next step includes building 308 a roaming neighbor list in the associated first and second APs for the MD, wherein the list includes those neighboring APs where the MD has been associated. A next step includes determining 310 that the MD is currently associated with an AP. A next step includes preemptively pushing 312 information about the MD to those APs in the list of the determined AP for synchronization.
    Type: Grant
    Filed: December 14, 2010
    Date of Patent: May 29, 2012
    Assignee: Symbol Technologies, Inc.
    Inventors: Trevor Miranda, Nicholas S. Dade
  • Publication number: 20120110183
    Abstract: A technique for distributed propagation of data in a wireless communication network includes providing 600 a unique host identifier for each peer network entity in the wireless communication network, each host identifier having a length of B bits. A next step includes requesting 602 data from peer network entities using a request having a host identifier of the requesting network entity. A next step includes, if a peer network entity is hosting the requested data, comparing 608 the host identifiers of the requesting network entity and the peer network entity receiving the request to determine a match. A next step includes responding 610 to the request if a match is determined.
    Type: Application
    Filed: October 28, 2010
    Publication date: May 3, 2012
    Applicant: SYMBOL TECHNOLOGIES, INC.
    Inventors: Trevor Miranda, Puneet Batta
  • Patent number: 8171539
    Abstract: Apparatus and methods are provided for implementing a firewall in a network infrastructure component. A method comprises generating a search tree for a plurality of rules. The search tree comprises a first node having a first field bounds and a first set of rules of the plurality of rules, and a plurality of child nodes for the first node. Each child node has child field bounds based on an intersection of the first field bounds and the first set of rules, and each child node is assigned a respective subset of the first set of rules based on the respective child field bounds. The method further comprises receiving a first packet, identifying a first child node of the plurality of child nodes based on values for one or more fields of the first packet, and applying the respective subset of rules assigned to the first child node to the first packet.
    Type: Grant
    Filed: January 7, 2009
    Date of Patent: May 1, 2012
    Assignee: Symbol Technologies, Inc.
    Inventor: Trevor Miranda
  • Publication number: 20100175124
    Abstract: Apparatus and methods are provided for implementing a firewall in a network infrastructure component. A method comprises generating a search tree for a plurality of rules. The search tree comprises a first node having a first field bounds and a first set of rules of the plurality of rules, and a plurality of child nodes for the first node. Each child node has child field bounds based on an intersection of the first field bounds and the first set of rules, and each child node is assigned a respective subset of the first set of rules based on the respective child field bounds. The method further comprises receiving a first packet, identifying a first child node of the plurality of child nodes based on values for one or more fields of the first packet, and applying the respective subset of rules assigned to the first child node to the first packet.
    Type: Application
    Filed: January 7, 2009
    Publication date: July 8, 2010
    Applicant: SYMBOL TECHNOLOGIES, INC.
    Inventor: Trevor Miranda
  • Patent number: 7336800
    Abstract: The present invention relates to a method, computer program product and a device for detecting watermarks in digital data for the purpose of electronic copyright management system. The invention includes transforming the original as well as unwatermarked data. Thereafter, tagging the resultant components of the transformed data using a pair of rows and columns. Then, selecting significant components in the said transformed data, transforming the suspected watermarked data and tagging the components in the transformed data. Further, selecting the tagged components from the transformed suspected watermarked data corresponding to those selected as significant in the original transformed data, and comparing said two groups of selected significant components to detect the watermarks.
    Type: Grant
    Filed: May 14, 2003
    Date of Patent: February 26, 2008
    Assignee: Indian Institute of Information Technology
    Inventors: Trevor Miranda, Manindra Mohan
  • Publication number: 20040062394
    Abstract: The present invention relates to a method, computer program product and a device for detecting watermarks in digital data for the purpose of electronic copyright management system. The invention includes transforming the original as well as unwatermarked data. Thereafter, tagging the resultant components of the transformed data using a pair of rows and columns. Then, selecting significant components in the said transformed data, transforming the suspected watermarked data and tagging the components in the transformed data. Further, selecting the tagged components from the transformed suspected watermarked data corresponding to those selected as significant in the original transformed data, and comparing said two groups of selected significant components to detect the watermarks.
    Type: Application
    Filed: May 14, 2003
    Publication date: April 1, 2004
    Applicant: Indian Institute of Information Technology
    Inventors: Trevor Miranda, Manindra Mohan