Patents by Inventor William Duane
William Duane has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9137373Abstract: The methods, apparatus, and systems described herein are designed to route customer communications to the best agent or best available agent. The methods include receiving a customer communication, predicting a personality type of the customer associated with the customer communication, and providing a routing recommendation to route the customer to an agent based on the personality type prediction and historical customer data.Type: GrantFiled: October 20, 2014Date of Patent: September 15, 2015Assignee: Mattersight CorporationInventors: Kelly Conway, David Gustafson, Douglas Brown, Michael Glen Gates, William Duane Skeen, Brendan Joyce
-
Patent number: 9106748Abstract: The methods, apparatus, and systems described herein facilitate optimizing routing decisions. The methods include retrieving and/or predicting a profile of a current customer and future customers, determining which agents are currently available and which agents are expected to be available, and providing a routing recommendation based on the profile retrieval or prediction for the current customer and the future customers, and the currently available agents' and expected available agents' proficiency at handling customers with the retrieved and/or predicted profiles.Type: GrantFiled: May 28, 2013Date of Patent: August 11, 2015Assignee: MATTERSIGHT CORPORATIONInventors: Kelly Conway, David Gustafson, Douglas Brown, Michael Glen Gates, William Duane Skeen, Brendan Joyce, Christopher Danson
-
Patent number: 9083804Abstract: The methods, apparatus, and systems described herein facilitate optimizing routing decisions. The methods include retrieving and/or predicting a profile of a current customer and future customers, determining which agents are currently available and which agents are expected to be available, and providing a routing recommendation based on the profile retrieval or prediction for the current customer and the future customers, and the currently available agents' and expected available agents' proficiency at handling customers with the retrieved and/or predicted profiles.Type: GrantFiled: October 8, 2013Date of Patent: July 14, 2015Assignee: MATTERSIGHT CORPORATIONInventors: Kelly Conway, David Gustafson, Douglas Brown, Michael Glen Gates, William Duane Skeen, Brendan Joyce, Christopher Danson
-
Patent number: 8966276Abstract: In a system for disconnected authentication, verification records corresponding to given authentication token outputs over a predetermined period of time, sequence of events, and/or set of challenges are downloaded to a verifier. The records include encrypted or hashed information for the given authentication token outputs. In one embodiment using time intervals, for each time interval, token output data, a salt value, and a pepper value, are hashed and compared with the verification record for the time interval. After a successful comparison, a user can access the computer. A PIN value can also be provided as an input the hash function. A portion of the hash function output can be used as a key to decrypt an encrypted (Windows) password, or other sensitive information.Type: GrantFiled: September 10, 2004Date of Patent: February 24, 2015Assignee: EMC CorporationInventors: Andrew Nanopoulos, Karl Ackerman, Piers Bowness, William Duane, Markus Jakobsson, Burt Kaliski, Dmitri Pal, Shane D. Rice, Ronald L. Rivest
-
Publication number: 20150036815Abstract: The methods, apparatus, and systems described herein are designed to route customer communications to the best agent or best available agent The methods include receiving a customer communication, predicting a personality type of the customer associated with the customer communication, and providing a routing recommendation to route the customer to an agent based on the personality type prediction and historical customer data.Type: ApplicationFiled: October 20, 2014Publication date: February 5, 2015Inventors: Kelly CONWAY, David GUSTAFSON, Douglas BROWN, Michael Glen GATES, William Duane SKEEN, Brendan JOYCE
-
Publication number: 20140355748Abstract: The methods, apparatus, and systems described herein facilitate optimizing routing decisions. The methods include retrieving and/or predicting a profile of a current customer and future customers, determining which agents are currently available and which agents are expected to be available, and providing a routing recommendation based on the profile retrieval or prediction for the current customer and the future customers, and the currently available agents' and expected available agents' proficiency at handling customers with the retrieved and/or predicted profiles.Type: ApplicationFiled: May 28, 2013Publication date: December 4, 2014Inventors: Kelly CONWAY, David Gustafson, Douglas Brown, Michael Glen Gates, William Duane Skeen, Brendan Joyce, Christopher Danson
-
Publication number: 20140355749Abstract: The methods, apparatus, and systems described herein facilitate optimizing routing decisions. The methods include retrieving and/or predicting a profile of a current customer and future customers, determining which agents are currently available and which agents are expected to be available, and providing a routing recommendation based on the profile retrieval or prediction for the current customer and the future customers, and the currently available agents' and expected available agents' proficiency at handling customers with the retrieved and/or predicted profiles.Type: ApplicationFiled: October 8, 2013Publication date: December 4, 2014Inventors: Kelly CONWAY, David GUSTAFSON, Douglas BROWN, Michael Glen GATES, William Duane SKEEN, Brendan JOYCE, Christopher DANSON
-
Patent number: 8867733Abstract: The methods, apparatus, and systems described herein are designed to route customer communications to the best available agent. The methods include predicting a personality type of the customer, determining the occupancy level of agents to provide a list of available agents, providing a routing recommendation based on the predicted personality type of the customer and agent data such as proficiency in handling customers with the predicted personality type, and/or analyzing real-time customer-agent interactions.Type: GrantFiled: November 26, 2013Date of Patent: October 21, 2014Assignee: Mattersight CorporationInventors: Kelly Conway, David Gustafson, Douglas Brown, Michael Glen Gates, William Duane Skeen, Brendan Joyce
-
Publication number: 20140270133Abstract: The methods, apparatus, and systems described herein are designed to route customer communications to the best available agent. The methods include predicting a personality type of the customer, determining the occupancy level of agents to provide a list of available agents, providing a routing recommendation based on the predicted personality type of the customer and agent data such as proficiency in handling customers with the predicted personality type, and/or analyzing real-time customer-agent interactions.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Inventors: Kelly CONWAY, David Gustafson, Douglas Brown, Michael Glen Gates, William Duane Skeen, Brendan Joyce
-
Patent number: 8832812Abstract: Access of a user to a protected resource during a session is controlled by issuing an authentication information request and receiving authentication information from the user responsive to the authentication information request. The user is authenticated based upon verification of the received authentication information. One or more of the issuing, receiving and authenticating steps are repeated during the session to re-authenticate the user. At least a portion of the authentication information that is used during the re-authentication is different from a corresponding portion of the authentication information that was used during the initial authentication. A secure channel is optionally established between the user and the protected resource responsive to the initial verification. The secure channel can optionally be re-established with the re-authentication using the different portion of the authentication information.Type: GrantFiled: March 31, 2011Date of Patent: September 9, 2014Assignee: EMC CorporationInventors: Todd Morneau, William Duane
-
Patent number: 8601588Abstract: A method includes engaging in authentication operations each involving apparent use of a legitimate authenticator. Values of one or more authenticator variables are received and stored, where the authenticator variable(s) normally change in a known authenticator-specific way during the authentication operations, such as being calculated from a monotonically increasing dynamic variable. A risk analysis function is applied to the stored values to generate a risk indicator signal indicating a level of risk that the clone authenticator is in use. The risk analysis function includes detection of an abnormal change of the authenticator variable(s), such as use of non-monotonic dynamic variable values. The risk indicator signal is output to an access controller that operates, based on the level of risk indicated by the risk indicator signal, to selectively inhibit an otherwise successful authentication operation involving apparent use of the legitimate authenticator.Type: GrantFiled: June 30, 2011Date of Patent: December 3, 2013Assignee: EMC CorporationInventors: Robert Black, William Duane, Robert S. Philpott
-
Patent number: 8458483Abstract: A technique of message-passing using shared memory of an RF tag involves storing a message in the shared memory while a security processor of the RF tag is in a sleep mode, the security processor being constructed and arranged to access the shared memory when the security processor is in a wakened mode. The technique further involves transitioning the security processor from the sleep mode to the wakened mode, and processing the message from the shared memory using the security processor after the security processor has transitioned from the sleep mode to the wakened mode. If the security processor is awakened only as needed (rather than remain in the wakened mode), lifetime of a battery which powers the security processor can be maximized.Type: GrantFiled: June 30, 2009Date of Patent: June 4, 2013Assignee: EMC CorporationInventors: Daniel Bailey, Marco Ciaffi, William Duane, Ari Juels, John O'Brien
-
Patent number: 8452989Abstract: A technique provides security to an electronic device. The technique involves disposing a microprocessor between a printed circuit board and a circuit element to restrict physical access to the microprocessor, the microprocessor having (i) a bottom which faces the printed circuit board in a first direction and (ii) a top which faces the circuit element in a second direction which is opposite the first direction. The technique further involves delivering power to the microprocessor from a power source while the microprocessor is disposed between the printed circuit board and the circuit element, the microprocessor performing electronic operations in response to the power delivered from the power source. The technique further involves electronically altering or preventing the microprocessor from further performing the electronic operations in response to tampering activity on the circuit element. Such detection of the tampering activity may involve monitoring a covert signal for tamper evidence detection.Type: GrantFiled: December 9, 2009Date of Patent: May 28, 2013Assignee: EMC CorporationInventors: Todd Morneau, William Duane
-
Patent number: 8370638Abstract: A method of generating authentication seeds for a plurality of users, the method involving: based on a single master seed, generating a plurality of derivative seeds, each one for a corresponding different one of a plurality of users; and distributing the plurality of derivative seeds to a verifier for use in individually authenticating each of the plurality of users to that verifier, wherein generating each one of the plurality of derivative seeds involves mathematically combining the master seed and a unique identifier identifying the corresponding user.Type: GrantFiled: February 17, 2006Date of Patent: February 5, 2013Assignee: EMC CorporationInventors: William Duane, Jeffrey Hamel
-
Patent number: 7831837Abstract: A method of communicating within a system that includes a device, a controller for the device, a token, and a driver which implements a predefined interface for enabling communication with and/or control of the device through the controller, the method involving: via the predefined interface, receiving instructions and/or data at the controller from the driver for controlling the device; via the predefined interface, receiving at the controller a preselected control parameter indicating that communication with the token is desired; and in response to receiving the preselected control parameter, directing communications to the token.Type: GrantFiled: June 15, 2006Date of Patent: November 9, 2010Assignee: EMC CorporationInventors: William Duane, Eric A. Silva, Jeffrey Hamel
-
Patent number: 7810147Abstract: A system for detecting and preventing replay attacks includes a plurality of interconnected authentication servers, and one or more tokens for generating a one-time passcode and providing the one-time passcode to one of the authentication servers for authentication. The system includes an adjudicator function associated with each authentication server. The adjudicator evaluates a high water mark value associated with a token seeking authentication, allows authentication to proceed for the token if the high water mark evaluation indicates that the one-time passcode was not used in a previous authentication, and prevents authentication if the high water mark evaluation indicates that the one-time passcode was used in a previous authentication. The token is associated with a home authentication server that maintains a current high water mark of the token. The home authentication server validates the current high water mark on behalf of the adjudicator function evaluating the token for authentication.Type: GrantFiled: December 1, 2006Date of Patent: October 5, 2010Assignee: EMC CorporationInventors: William Duane, Lawrence N. Friedman, Alexander Volanis
-
Publication number: 20080307681Abstract: A landscape rake attachment for an excavation machine. An exemplary attachment may have a grasping plate with a back surface sized to rest against a teeth edge of the machine bucket and a front surface to make contact with a machine thumb. An anti-slip plate may extend along a top edge of the grasping plate with a width greater than the depth of the grasping plate. A finger mounting plate may be coupled to a lower edge of the grasping plate and extend horizontally from each side of the lower edge. A plurality of fingers may be coupled to the finger mounting plate and extending downward from the finger mounting plate.Type: ApplicationFiled: June 11, 2008Publication date: December 18, 2008Inventor: William Duane McNeil
-
Publication number: 20070256123Abstract: A system for detecting and preventing replay attacks includes a plurality of interconnected authentication servers, and one or more tokens for generating a one-time passcode and providing the one-time passcode to one of the authentication servers for authentication. The system includes an adjudicator function associated with each authentication server. The adjudicator evaluates a high water mark value associated with a token seeking authentication, allows authentication to proceed for the token if the high water mark evaluation indicates that the one-time passcode was not used in a previous authentication, and prevents authentication if the high water mark evaluation indicates that the one-time passcode was used in a previous authentication. The token is associated with a home authentication server that maintains a current high water mark of the token. The home authentication server validates the current high water mark on behalf of the adjudicator function evaluating the token for authentication.Type: ApplicationFiled: December 1, 2006Publication date: November 1, 2007Applicant: RSA Security, Inc.Inventors: William Duane, Lawrence Friedman, Alexander Volanis
-
Publication number: 20070174614Abstract: A method of generating authentication seeds for a plurality of users, the method involving: based on a single master seed, generating a plurality of derivative seeds, each one for a corresponding different one of a plurality of users; and distributing the plurality of derivative seeds to a verifier for use in individually authenticating each of the plurality of users to that verifier, wherein generating each one of the plurality of derivative seeds involves mathematically combining the master seed and a unique identifier identifying the corresponding user.Type: ApplicationFiled: February 17, 2006Publication date: July 26, 2007Applicant: RSA Security Inc.Inventors: William Duane, Jeffrey Hamel
-
Publication number: 20070094498Abstract: A single sign-on technique allows multiple accesses to one or more applications or other resources using a proof-of-authentication module operating in conjunction with a standard authentication component. The application or other resource issues an authentication information request to the standard authentication component responsive to an access request from the user. The application or other resource receives, responsive to the authentication information request, a proof-of-authentication value from the standard authentication component, and authenticates the user based on the proof-of-authentication value. The standard authentication component interacts with the proof-of-authentication module to obtain the proof-of authentication value. The proof-of-authentication module is configured to generate multiple proof-of-authentication values for authentication of respective access requests of the user.Type: ApplicationFiled: September 12, 2006Publication date: April 26, 2007Inventors: Magnus Nystrom, Anders Rundgren, William Duane