Patents by Inventor Yannis Labrou

Yannis Labrou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7353382
    Abstract: A computer system, a method of a computer system and a computer-readable medium securely transmit and verify a multiparty agreement. The method, the computer system, and the computer readable medium include developing and transmitting views of the multi-party agreement by each party to a separate verification party. The verification party authenticates the participants and determines whether the views of the agreement are mutually consistent, and notifies the partys of the results of the comparison.
    Type: Grant
    Filed: June 11, 2003
    Date of Patent: April 1, 2008
    Assignee: Fujitsu Limited
    Inventors: Yannis Labrou, Lusheng Ji, Jonathan Russell Agre
  • Patent number: 7349871
    Abstract: A method for conducting a purchasing agreement for goods and services between a consumer and a merchant through a trusted a third party and using a wireless network includes generating, by the consumer, a first view of the agreement and transmitting the first view of the agreement to the third party, generating, independently by the merchant, a second view of the agreement and transmitting the second view of the agreement to the third party, and receiving, by the third party the consumer view of the agreement and the merchant view of the agreement, verifying identities of the merchant and the consumer and that the details of the independently generated views of the agreements are consistent and taking action to execute the purchasing agreement if the conditions are satisfied. The third party includes a Secure Transaction Server.
    Type: Grant
    Filed: July 29, 2003
    Date of Patent: March 25, 2008
    Assignee: Fujitsu Limited
    Inventors: Yannis Labrou, Lusheng Ji, Jonathan Russell Agre
  • Publication number: 20070266384
    Abstract: Associating a semantic service description (SSD) with a service, wherein the SSD comprises a semantic description of the service, including a semantic description of a parameter of the service, according to a computer interpretable language, and, as a service grounding, a mapping between the computer interpretable language expressing the SSD and an interface, including an interface parameter, of the service. A dynamic composition of a task based upon a user selection of a plurality of known services is supported and a dynamic association of the task with a user interface of an application is supported, based upon associating the task with the user selection of a UI object, a UI display screen, and a UI event for the application.
    Type: Application
    Filed: March 27, 2007
    Publication date: November 15, 2007
    Applicant: Fujitsu Limited
    Inventors: Yannis Labrou, Ryusuke Masuoka, Zhexuan Song, Guang Huang
  • Publication number: 20070033590
    Abstract: An apparatus provides computing sources of functionality, each computing source of functionality presents a service and exists in any computing environment of the apparatus. The apparatus associates a semantic service description (SSD) with the service. The SSD has a semantic description of the service, including a semantic description of a parameter of the service, according to a computer interpretable language, and, as a service grounding, a mapping between the computer interpretable language expressing the SSD and an interface, including an interface parameter, of the service.
    Type: Application
    Filed: August 30, 2006
    Publication date: February 8, 2007
    Applicant: Fujitsu Limited
    Inventors: Ryusuke Masuouka, Yannis Labrou, Zhexuan Song, Sung Lee
  • Publication number: 20070022058
    Abstract: Methods and systems provide a secure transaction server (STS); provide an authentic point of sale (POS) device, according to a first authentication parameter of the STS; provide an authentic mobile purchasing device, according to a second authentication parameter of the STS; provide a short-range communication method between the POS device and the mobile purchasing device; correlate by the STS a personal identification entry (PIE) and the authentic mobile purchasing device; transmit, by the POS device, a time dependent transformed secure POS authenticable POS purchase action to the STS; input the PIE to the mobile purchasing device to transmit a time dependent transformed secure user authenticable POS purchase action to the POS device via the short-range communication method; and approve, by the STS, the POS purchase action for the POS device and for the mobile purchasing device, according to the authentic POS device, and according to the authentic mobile purchasing device and the STS correlating of the PIE a
    Type: Application
    Filed: July 18, 2006
    Publication date: January 25, 2007
    Applicant: Fujitsu Limited
    Inventors: Yannis Labrou, Jonathan Agre
  • Publication number: 20060206709
    Abstract: A method, and an apparatus performing the method, is provided by authenticating a mobile device communicably connectable to a wireless network by an authentication parameter from a secure transaction server (STS), as a mobile device authenticator; providing an STS correlation between a personal identification entry (PIE) and the mobile device authenticator; and inputting, by a user, the PIE and a provider action, to the mobile device authenticator to transmit a transformed secure user authenticable authorization request to the STS over the wireless network to authorize an action with a provider.
    Type: Application
    Filed: March 24, 2006
    Publication date: September 14, 2006
    Applicant: Fujitsu Limited
    Inventors: Yannis Labrou, Jonathan Agre
  • Publication number: 20050246726
    Abstract: Task Computing computer system by segmenting the system into a plurality of implementation tiers of a presentation layer, a remote procedure call programming interface (API), a middleware layer to which the presentation layer interfaces via the remote procedure call API to real-time, dynamically generate a computer implemented task interface at the presentation layer to a semantically described source of function as a service on a computer system, and a service layer and a function source realization layer providing the semantically described source of function as the service on the computer system to which the middleware layer interfaces. Real-time and dynamically composing an executable task that comprises one or more services using the generated task interface at the presentation layer to one or more services on the computer based upon the semantically described application-, device- and service-rich computer.
    Type: Application
    Filed: April 27, 2005
    Publication date: November 3, 2005
    Applicant: Fujitsu Limited
    Inventors: Yannis Labrou, Ryusuke Masuouka, Duy Huynh, Zhexuan Song
  • Publication number: 20050203966
    Abstract: A computer-based system securely transmitting and authenticating a transaction input by a user while retaining the anonymity of the user with respect to content of the transaction, including a device encoding the content of the transaction input by the user with a key known only to another device, encoding other portions of the transaction with another key known only to a secure transaction server, and sending the encoded content of the transaction and the encoded other portions of the transaction to the secure transaction server to authenticate an identity of the user of the device, wherein the secure transaction server decodes the other portions of the transaction and sends the encoded content of the transaction to the another device to be finally decoded.
    Type: Application
    Filed: January 25, 2005
    Publication date: September 15, 2005
    Applicant: Fujitsu Limited
    Inventors: Yannis Labrou, Lusheng Ji, Jonathan Agre, Jesus Terriza
  • Publication number: 20050187873
    Abstract: A mobile phone system and method of initializing, at a secure transaction server (STS), a mobile payment software with a software authentication parameter, as an authentic mobile payment software; providing an STS correlation between a personal identification entry (PIE) and the authentic mobile payment software; installing, in a mobile phone, the authentic mobile payment software; and inputting, by a user, the PIE to the installed authentic mobile payment software to generate according to the PIE and the software authentication parameter a transformed secure authenticable mobile phone cashless monetary transaction over the mobile phone network, as a mobile phone wireless wallet of the user of the mobile phone. The mobile phone authenticable cashless monetary transaction is performed according to an agreement view(s) protocol.
    Type: Application
    Filed: January 31, 2005
    Publication date: August 25, 2005
    Applicant: FUJITSU LIMITED
    Inventors: Yannis Labrou, Lusheng Ji, Jonathan Agre, Jesus Terriza, Wei-lun Chen
  • Publication number: 20050138410
    Abstract: Pervasive security is provided by a combination of physical interfaces and network interfaces to a service to a user includes establishing by the user's client device network connectivity to the service, transmitting by the service an identifier to the user's client device, determining by the service whether the user enters the identifier into the service in physical proximity to the service, and invoking the service once the user has entered the identifier into the service while in physical proximity to the service. The service can provide indication that the service has been granted by sending a control page to the user's client device.
    Type: Application
    Filed: September 17, 2004
    Publication date: June 23, 2005
    Applicant: FUJITSU LIMITED
    Inventors: Ryusuke Masuouka, Narendar Shankar, Zhexuan Song, Wei-lun Chen, Michael Grove, Yannis Labrou, Jonathan Agre
  • Publication number: 20050043999
    Abstract: A pay-per-connection system is coupled to a network service provider and to a client computer. The pay-per-connection system receives payment and a passcode from a user, determines duration of use based on the payment, and provides access by the client computer to the network service provider based on the payment and the passcode without advance sign-up by the user with the network service provider.
    Type: Application
    Filed: June 25, 2004
    Publication date: February 24, 2005
    Applicant: Fujitsu Limited
    Inventors: Lusheng Ji, Yannis Labrou, Jonathan Agre
  • Publication number: 20050027543
    Abstract: A method for conducting a purchasing agreement for goods and services between a consumer and a merchant through a trusted a third party and using a wireless network includes generating, by the consumer, a first view of the agreement and transmitting the first view of the agreement to the third party, generating, independently by the merchant, a second view of the agreement and transmitting the second view of the agreement to the third party, and receiving, by the third party the consumer view of the agreement and the merchant view of the agreement, verifying identities of the merchant and the consumer and that the details of the independently generated views of the agreements are consistent and taking action to execute the purchasing agreement if the conditions are satisfied. The third party includes a Secure Transaction Server.
    Type: Application
    Filed: July 29, 2003
    Publication date: February 3, 2005
    Applicant: FUJITSU LIMITED
    Inventors: Yannis Labrou, Lusheng Jl, Jonathan Agre
  • Publication number: 20040230636
    Abstract: A computer-based system includes task computing enabling users to define tasks by combining available functionality and to execute such tasks. The computer-based system of includes available functionality which originates in devices, computing applications and electronic services available through local and remote procedure calls including Web Services, UPnP, CORBA, RMI, RPC, DCE, DCOM or comprises previously defined tasks. All available functionality is abstracted to the user as a service and each service is expressed in a service description language, and the services have a semantic description associated with them.
    Type: Application
    Filed: December 12, 2003
    Publication date: November 18, 2004
    Applicant: Fujitsu Limited
    Inventors: Ryusuke Masuoka, Yannis Labrou, Zhexuan Song
  • Publication number: 20040107170
    Abstract: A computer system for conducting purchase transactions using wireless communication between a consumer and a merchant includes a consumer operated mobile device, a merchant operated device, a trusted secure transaction server (STS) device, one or more payment service devices, a wireless communication network in communication with the consumer device and the merchant device, a communication network in communication with the merchant device and the STS device, and a communication network in communication with the STS device and the payment service devices. The consumer device, merchant device and secure transaction server device are capable of executing the Secure Transaction Protocol.
    Type: Application
    Filed: July 29, 2003
    Publication date: June 3, 2004
    Applicant: FUJITSU LIMITED
    Inventors: Yannis Labrou, Lusheng Ji, Jonathan Russell Agre
  • Publication number: 20040098350
    Abstract: A system for conducting an agreement between two parties relying on a trusted a third party includes a first party generating a first view of the agreement and transmitting the first view of the agreement to the third party, a second party independently generating a second view of the agreement and transmitting the second view of the agreement to the third party, a wireless network connecting the first party and the second party, and a wired or wireless network connecting the second party to the third party. The trusted third party, receives the first view of the agreement and the second view of the agreement, verifies conditions including that the identities of the parties that transmitted the agreements and that the independent views of the agreement are consistent with each other, and takes action to execute the agreement if the conditions are satisfied.
    Type: Application
    Filed: July 29, 2003
    Publication date: May 20, 2004
    Applicant: FUJITSU LIMITED
    Inventors: Yannis Labrou, Lusheng Ji, Jonathan Russell Agre
  • Publication number: 20040030894
    Abstract: A computer system, a method of a computer system and a computer-readable medium securely transmit and verify a multiparty agreement. The method, the computer system, and the computer readable medium include developing and transmitting views of the multi-party agreement by each party to a separate verification party. The verification party authenticates the participants and determines whether the views of the agreement are mutually consistent, and notifies the partys of the results of the comparison.
    Type: Application
    Filed: June 11, 2003
    Publication date: February 12, 2004
    Applicant: FUJITSU LIMITED
    Inventors: Yannis Labrou, Lusheng Ji, Jonathan Russell Agre
  • Publication number: 20030033179
    Abstract: A method for generating customized alerts related to the procurement, sourcing, strategic sourcing and/or sale of one or more items by an enterprise is disclosed. The method is based on a Value Chain Intelligence (VCI) system that enables suppliers and procurement professionals to leverage enterprise and marketplace data in order to potentially improve decision-making in business enterprises. Accordingly, internal data from enterprises and external data from suppliers, catalogs, and marketplaces are integrated and analyzed in real time for their impact on supply chains processes. When an event occurs or data is received potentially affecting decisions regarding the procurement, sourcing, strategic sourcing, and/or sale of one or more items, the system correlates the data with predetermined conditions, which, when satisfied, trigger one or more software modules to send alerts to specified users about the potential impact of the event and/or data on the particular item/s.
    Type: Application
    Filed: August 9, 2001
    Publication date: February 13, 2003
    Inventors: Steven Bruce Katz, Yannis Labrou, Jonathan P. Thompson, Kenneth M. Rudin
  • Publication number: 20020178077
    Abstract: A method for automatically invoking a software module in response to an internal or external event affecting the purchase or sale of an item is disclosed. The method is based on a Value Chain Intelligence (VCI) system that enables suppliers and procurement professionals to leverage enterprise and marketplace data in order to potentially improve decision-making in business enterprises. Accordingly, internal data from enterprises and external data from suppliers, catalogs, and marketplaces are integrated and analyzed in real time for their impact on supply chains processes. When an internal or external event occurs, directly affecting the purchase and/or sale of an item, and/or decisions regarding procurement, sourcing, strategic sourcing, and other business processes, the system understands the event, correlates the event with the aforementioned processes, automatically invokes one or more software modules, which make recommendations and send alerts to users about the potential impact of such an event.
    Type: Application
    Filed: May 25, 2001
    Publication date: November 28, 2002
    Inventors: Steven Bruce Katz, Yannis Labrou
  • Publication number: 20020174000
    Abstract: A method for assisting a user with procurement decisions, sourcing decisions and strategic sourcing decisions in an enterprise is disclosed. The method implements a plurality of software modules in a logical workflow process based on the results of integrating and analyzing data. The workflow process provides a plurality of steps for discovering data, analyzing data, alerting the user about the data, recommending actions to the user based on the data, and executing those actions. The workflow process is based on a Value Chain Intelligence (VCI) system, which integrates and analyzes internal data from enterprises and external data from suppliers, catalogs, and marketplaces in real time for their impact on supply chains processes. Components for such a system may consist of internal data collection components, external data collection components, data integration components, and data application components.
    Type: Application
    Filed: May 15, 2001
    Publication date: November 21, 2002
    Inventors: Steven Bruce Katz, Yannis Labrou, Manoranjan Kanthanathan, Kenneth M. Rudin
  • Publication number: 20020138316
    Abstract: A system and methods based thereon for a Value Chain Intelligence (VCI) system that enables suppliers and procurement professionals to leverage enterprise and marketplace data in order to potentially improve decision-making in business enterprises. In this system, internal data from enterprises and external data from suppliers, catalogs, and marketplaces are integrated and analyzed in real time for their impact on supply chains processes. The VCI system makes recommendations and alerts users based on the results of the integrated and analyzed data. Components in a VCI system may consist of internal data collection components, external data collection components, data integration components, and data application components. The system provides a plurality of methods for searching, extracting, transforming, integrating, analyzing, and representing data internal to an enterprise and data external to an enterprise.
    Type: Application
    Filed: March 23, 2001
    Publication date: September 26, 2002
    Inventors: Steven Bruce Katz, Yannis Labrou, Truc T. Dam, Joyce Leah Dickerson, Manoranjan Kanthanathan, David Kolodney, Timothy Edge Levine, Richard C. Li, Ram Kumar Nori, Eamon Gearoid O Neill, Kenneth M. Rudin, Quoc Tai Tran