Patents by Inventor William Leddy

William Leddy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160149927
    Abstract: A method, system and device for allowing the secure collection of sensitive information is provided. The device includes a display, and a user interface capable of receiving at least one user-generated interrupt in response to a stimulus generated in response to content received by the device, wherein the action taken upon receiving the user-generated interrupt depends on a classification of the content, the classification identifying the content as trusted or not trusted. The method includes detecting a request for sensitive information in content, determining if an interrupt is generated, determining if the content is trusted, allowing the collection of the sensitive information if the interrupt is generated and the content is trusted, and performing an alternative action if the interrupt is generated and the content is not trusted. The method may include instructions stored on a computer readable medium.
    Type: Application
    Filed: February 1, 2016
    Publication date: May 26, 2016
    Inventors: Bjorn Markus JAKOBSSON, William LEDDY
  • Patent number: 9286449
    Abstract: A method, system and device for allowing the secure collection of sensitive information is provided. The device includes a display, and a user interface capable of receiving at least one user-generated interrupt in response to a stimulus generated in response to content received by the device, wherein the action taken upon receiving the user-generated interrupt depends on a classification of the content, the classification identifying the content as trusted or not trusted. The method includes detecting a request for sensitive information in content, determining if an interrupt is generated, determining if the content is trusted, allowing the collection of the sensitive information if the interrupt is generated and the content is trusted, and performing an alternative action if the interrupt is generated and the content is not trusted. The method may include instructions stored on a computer readable medium.
    Type: Grant
    Filed: December 28, 2011
    Date of Patent: March 15, 2016
    Assignee: PAYPAL, INC.
    Inventors: Bjorn Markus Jakobsson, William Leddy
  • Publication number: 20130247173
    Abstract: Systems and methods for credential character selection are provided. The system includes one or more sensors configured to detect a character selection and generate a character selection signal, and detect a character selection completion and generate a character selection completion signal. The system also includes one or more processors coupled to the one or more sensors, the one or more processors configured to receive the character selection signal and the character selection completion signal, and generate an output signal based on the received character selection signal that includes components of a credential. The system also includes a network interface component configured to transmit the output signal. The credential characters may be components of a PIN or password. Moreover, the credential character selections may be made on one device, but displayed on a separate coupled device. The character selections may be a selection of a character or a modification of character.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 19, 2013
    Applicant: EBAY INC.
    Inventors: Bjorn Markus Jakobsson, James Roy Palmer, William Leddy
  • Publication number: 20120192277
    Abstract: A method, system and device for allowing the secure collection of sensitive information is provided. The device includes a display, and a user interface capable of receiving at least one user-generated interrupt in response to a stimulus generated in response to content received by the device, wherein the action taken upon receiving the user-generated interrupt depends on a classification of the content, the classification identifying the content as trusted or not trusted. The method includes detecting a request for sensitive information in content, determining if an interrupt is generated, determining if the content is trusted, allowing the collection of the sensitive information if the interrupt is generated and the content is trusted, and performing an alternative action if the interrupt is generated and the content is not trusted. The method may include instructions stored on a computer readable medium.
    Type: Application
    Filed: December 28, 2011
    Publication date: July 26, 2012
    Inventors: Bjorn Markus Jakobsson, William Leddy
  • Publication number: 20120173324
    Abstract: Systems and methods according to one or more embodiments facilitate electronic commerce over a network. In an embodiment, a method comprises creating a user profile comprising information including data entered by a primary user related to a product or service on a user device as well as data from other users that are related to or have common interests with the primary user, wherein the user profile dynamically changes based on, at least in part, new actions by the primary user as well as new actions by the other users. The method also comprises weighing the information in the user profile to determine targeted recommendations for the primary user. And the method further comprises providing the targeted recommendations to the primary user based on the user profile.
    Type: Application
    Filed: December 15, 2011
    Publication date: July 5, 2012
    Applicant: eBay, Inc.
    Inventors: Christina Marie Vallery, William Leddy
  • Patent number: 6275942
    Abstract: A system, method and computer program product for automatic response to computer system misuse using active response modules (ARMs). ARMs are tools that allow static intrusion detection system applications the ability to dynamically increase security levels by allowing real-time responses to detected instances of computer misuse. Several classes of ARMs exist which allow them to interface with several types of network elements found within a computing environment (e.g., firewalls, web servers, Kerberos severs, certificate authorities, etc.). The ARMs, once defined, are deployed in a “plug and play” manner into an existing intrusion detection system within a computing environment. A user (e.g., system administrator) may then configure the ARMs by linking them to specific computer misuses.
    Type: Grant
    Filed: May 20, 1998
    Date of Patent: August 14, 2001
    Assignee: Network Associates, Inc.
    Inventors: Thomas Bernhard, Terry Escamilla, William Leddy, Richard Letsinger, Crosby Marks, Steven E. Smaha, Steven R. Snapp