Kenneth W. Conley - Mountain View CA, US Dirk Balfanz - Menlo Park CA, US Bryan A. Pendleton - Menlo Park CA, US Diana K. Smetters - San Francisco CA, US Glenn E. Durfee - San Francisco CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
International Classification:
H04K 1/00 H04L 9/00
US Classification:
380 33, 380270, 713150, 713168
Abstract:
A method for establishing a secondary communication channel between at least two computing devices over a network medium through use of a primary channel connects a first computing device with a first telephonic unit and a second computing device with a second telephonic unit. If the two telephonic units are in communication with each other over a primary channel, and communication channels are established between the computing devices and their respective telephonic units, then the first computing device transmits its location information to the second computing device over the primary channel. A connection is then established between the second computing device and the first computing device over a secondary communication channel.
Dirk Balfanz - Menlo Park CA, US Teresa Lunt - Palo Alto CA, US Diana Smetters - San Francisco CA, US Ken Conley - Mountain View CA, US Paul Stewart - Sunnyvale CA, US Steve Cousins - San Jose CA, US Bryan Pendleton - Menlo Park CA, US
Assignee:
Xerox Corporation - Norwalk CT
International Classification:
H04L 9/32
US Classification:
713169, 713165, 713170
Abstract:
A system and method for sharing files securely includes server software on a first device configured to communicate with server software operating on one or more other preauthorized devices, such as a second device. The servers communicate with each other securely using cryptographic information exchanged during a preauthorization phase using a range-limited communication channel. The server on the first device obtains file information from the other preauthorized device(s) and combines the information with local file information from the first device. This combined file information is sent to client software operating on the machine, which presents the combined file information to users.
Method And Apparatus For Calibrating A Camera-Based Whiteboard Scanner
Eric Saund - San Carlos CA, US Bryan Pendleton - Menlo Park CA, US Kimon Roufas - Cambridge MA, US Hadar Shemtov - Palo Alto CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
International Classification:
G09G 5/00
US Classification:
382275, 345178
Abstract:
In accordance with one aspect of the present exemplary embodiments, a calibration arrangement is configured to assist in calibration of a surface scanning system where the calibration arrangement includes a preconfigured physical object which may embody dimensional information wherein the dimensional information is used to calibrate a surface of the scanning system. In an alternative embodiment, the preconfigured physical object is configured to obtain data for use in calibration of the surface of a pan/tilt surface scanning system.
System And Method For Establishing Secondary Channels
Kenneth W. Conley - Mountain View CA, US Dirk Balfanz - Menlo Park CA, US Bryan A. Pendleton - Menlo Park CA, US Diana K. Smetters - San Francisco CA, US Glenn E. Durfee - San Francisco CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
International Classification:
H04L 9/32
US Classification:
380 33, 713168, 713169, 709227, 709228
Abstract:
A method for establishing a secondary communication channel between at least two computing devices over a network medium through use of a primary channel connects a first computing device with a first telephonic unit and a second computing device with a second telephonic unit. If the two telephonic units are in communication with each other over a primary channel, and communication channels are established between the computing devices and their respective telephonic units, then the first computing device transmits its location information to the second computing device over the primary channel. A connection is then established between the second computing device and the first computing device over a secondary communication channel.
Systems And Methods For Authenticating Communications In A Network Medium
Dirk Balfanz - Redwood City CA, US Diana Smetters - Belmont CA, US Kenneth Conley - Mountain View CA, US Bryan Pendleton - Menlo Park CA, US Steve Cousins - San Jose CA, US
Assignee:
Palo Alto Research Center Incorporated - Palo Alto CA
A system and method for sharing files securely includes server software on a first device configured to communicate with server software operating on one or more other preauthorized devices, such as a second device. The servers communicate with each other securely using cryptographic information exchanged during a preauthorization phase using a range-limited communication channel. The server on the first device obtains file information from the other preauthorized device(s) and combines the information with local file information from the first device. This combined file information is sent to client software operating on the machine, which presents the combined file information to users.
Systems And Methods For Authenticating Communications In A Network Medium
Diana Smetters - San Francisco CA, US Kenneth Conley - Mountain View CA, US Bryan Pendleton - Menlo Park CA, US Glenn Durfee - San Francisco CA, US Steve Cousins - San Jose CA, US Dirk Balfanz - Menlo Park CA, US Hadar Shemtov - Palo Alto CA, US
Assignee:
PARC INC. - Palo Alto CA
International Classification:
H04L009/00 G06F011/30
US Classification:
380277000, 713163000, 713201000
Abstract:
A location-limited channel is implemented using physical exchanges of physical tokens. The physical tokens are implemented using writeable or re-writeable storage media. Location-limited channels, when used to implement pre-authentication protocols, provide demonstrative identification and authenticity. A group originator loads pre-authentication information and a network location from a communication device onto the location-limited physical token channel. The location-limited physical token channel is passed to another participant, who copies the originator's pre-authentication information and location onto that participant's communication device. That participant then adds that participant's own pre-authentication information and network location onto the location-limited physical token channel. This is repeated until the last participant passes the location-limited physical token channel back to the group originator. The originator thus has pre-authentication information and network locations for all other participants. The originator establishes secure communications with each participant based on the originator' and that participant's shared information.
Systems And Methods For Verifying A User Based On Reputational Information
- Mountain View CA, US Edison Tan - Brooklyn NY, US Sacha Christophe Arnoud - San Francisco CA, US David John Abraham - Brooklyn NY, US Michael Crawford - Sydney, AU Colin McMillen - Somerville MA, US Joseph Andrew McClain - Cranberry Township PA, US Bryan Arthur Pendleton - Swissvale PA, US Mark R. Russell - Prospect PA, US Luis Von Ahn - Pittsburgh PA, US
Assignee:
GOOGLE INC. - Mountain View CA
International Classification:
H04L 29/06
US Classification:
726 7
Abstract:
Systems and methods for verifying a user based on reputational information are provided. In particular, a computerized CAPTCHA system consisting of one or more computers can determine a trust score based on one or more reputation signals associated with a user computing device, select a challenge to provide to the user computing device based on the trust score, and determine whether to verify the user computing device based on a received response to the challenge and/or the trust score.
Google, Inc. - Greater Pittsburgh Area since Feb 2011
Software Engineer
Don't Just Sit There - Do Something! since Feb 2012
Co-creator and Executive Producer
Carnegie Mellon University Aug 2007 - Dec 2010
Graduate Student
Palo Alto Research Center Jun 2001 - Jul 2007
Member of Research Staff
Education:
Carnegie Mellon University 2007 - 2010
PhD, not completed, Human Computer Interaction
Washington University in St. Louis 1996 - 2001
BS/MS, Computer Science